Sep 13 00:05:29.989127 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Sep 13 00:05:29.989166 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 12 23:05:37 -00 2025 Sep 13 00:05:29.989189 kernel: efi: EFI v2.70 by EDK II Sep 13 00:05:29.989204 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Sep 13 00:05:29.989218 kernel: ACPI: Early table checksum verification disabled Sep 13 00:05:29.989231 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Sep 13 00:05:29.989247 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Sep 13 00:05:29.989261 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Sep 13 00:05:29.989275 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Sep 13 00:05:29.989289 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Sep 13 00:05:29.989307 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Sep 13 00:05:29.989321 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Sep 13 00:05:29.989334 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Sep 13 00:05:29.989348 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Sep 13 00:05:29.995016 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Sep 13 00:05:29.995411 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Sep 13 00:05:29.995588 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Sep 13 00:05:29.995610 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Sep 13 00:05:29.995627 kernel: printk: bootconsole [uart0] enabled Sep 13 00:05:29.995643 kernel: NUMA: Failed to initialise from firmware Sep 13 00:05:29.995660 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Sep 13 00:05:29.995676 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Sep 13 00:05:29.995691 kernel: Zone ranges: Sep 13 00:05:29.995707 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Sep 13 00:05:29.995722 kernel: DMA32 empty Sep 13 00:05:29.995738 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Sep 13 00:05:29.995761 kernel: Movable zone start for each node Sep 13 00:05:29.995776 kernel: Early memory node ranges Sep 13 00:05:29.995791 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Sep 13 00:05:29.995805 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Sep 13 00:05:29.995820 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Sep 13 00:05:29.995834 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Sep 13 00:05:29.995849 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Sep 13 00:05:29.995863 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Sep 13 00:05:29.995878 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Sep 13 00:05:29.995892 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Sep 13 00:05:29.995907 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Sep 13 00:05:29.995921 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Sep 13 00:05:29.995940 kernel: psci: probing for conduit method from ACPI. Sep 13 00:05:29.995955 kernel: psci: PSCIv1.0 detected in firmware. Sep 13 00:05:29.995975 kernel: psci: Using standard PSCI v0.2 function IDs Sep 13 00:05:29.995991 kernel: psci: Trusted OS migration not required Sep 13 00:05:29.996006 kernel: psci: SMC Calling Convention v1.1 Sep 13 00:05:29.996025 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Sep 13 00:05:29.996040 kernel: ACPI: SRAT not present Sep 13 00:05:29.996056 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Sep 13 00:05:29.996071 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Sep 13 00:05:29.996087 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 13 00:05:29.996102 kernel: Detected PIPT I-cache on CPU0 Sep 13 00:05:29.996118 kernel: CPU features: detected: GIC system register CPU interface Sep 13 00:05:29.996133 kernel: CPU features: detected: Spectre-v2 Sep 13 00:05:29.996148 kernel: CPU features: detected: Spectre-v3a Sep 13 00:05:29.996163 kernel: CPU features: detected: Spectre-BHB Sep 13 00:05:29.996178 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 13 00:05:29.996198 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 13 00:05:29.996213 kernel: CPU features: detected: ARM erratum 1742098 Sep 13 00:05:29.996228 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Sep 13 00:05:29.996243 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Sep 13 00:05:29.996258 kernel: Policy zone: Normal Sep 13 00:05:29.996276 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 00:05:29.996292 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:05:29.996307 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:05:29.996323 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 00:05:29.996338 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:05:29.996358 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Sep 13 00:05:29.996374 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Sep 13 00:05:29.996389 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:05:29.996404 kernel: trace event string verifier disabled Sep 13 00:05:29.996419 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 13 00:05:29.996435 kernel: rcu: RCU event tracing is enabled. Sep 13 00:05:29.996451 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:05:29.996467 kernel: Trampoline variant of Tasks RCU enabled. Sep 13 00:05:29.996482 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:05:29.996498 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:05:29.996513 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:05:29.996528 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 13 00:05:29.996547 kernel: GICv3: 96 SPIs implemented Sep 13 00:05:29.996562 kernel: GICv3: 0 Extended SPIs implemented Sep 13 00:05:29.996607 kernel: GICv3: Distributor has no Range Selector support Sep 13 00:05:29.996624 kernel: Root IRQ handler: gic_handle_irq Sep 13 00:05:29.996639 kernel: GICv3: 16 PPIs implemented Sep 13 00:05:29.996654 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Sep 13 00:05:29.996669 kernel: ACPI: SRAT not present Sep 13 00:05:29.996684 kernel: ITS [mem 0x10080000-0x1009ffff] Sep 13 00:05:29.996699 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Sep 13 00:05:29.996715 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Sep 13 00:05:29.996730 kernel: GICv3: using LPI property table @0x00000004000b0000 Sep 13 00:05:29.996751 kernel: ITS: Using hypervisor restricted LPI range [128] Sep 13 00:05:29.996766 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Sep 13 00:05:29.996781 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Sep 13 00:05:29.996796 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Sep 13 00:05:29.996812 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Sep 13 00:05:29.996827 kernel: Console: colour dummy device 80x25 Sep 13 00:05:29.996843 kernel: printk: console [tty1] enabled Sep 13 00:05:29.996859 kernel: ACPI: Core revision 20210730 Sep 13 00:05:29.996875 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Sep 13 00:05:29.996891 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:05:29.996910 kernel: LSM: Security Framework initializing Sep 13 00:05:29.996926 kernel: SELinux: Initializing. Sep 13 00:05:29.996942 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 00:05:29.996957 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 00:05:29.996973 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:05:29.996988 kernel: Platform MSI: ITS@0x10080000 domain created Sep 13 00:05:29.997004 kernel: PCI/MSI: ITS@0x10080000 domain created Sep 13 00:05:29.997019 kernel: Remapping and enabling EFI services. Sep 13 00:05:29.997035 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:05:29.997050 kernel: Detected PIPT I-cache on CPU1 Sep 13 00:05:29.997070 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Sep 13 00:05:29.997085 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Sep 13 00:05:29.997101 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Sep 13 00:05:29.997116 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:05:29.997132 kernel: SMP: Total of 2 processors activated. Sep 13 00:05:29.997147 kernel: CPU features: detected: 32-bit EL0 Support Sep 13 00:05:29.997163 kernel: CPU features: detected: 32-bit EL1 Support Sep 13 00:05:29.997178 kernel: CPU features: detected: CRC32 instructions Sep 13 00:05:29.997193 kernel: CPU: All CPU(s) started at EL1 Sep 13 00:05:29.997214 kernel: alternatives: patching kernel code Sep 13 00:05:29.997229 kernel: devtmpfs: initialized Sep 13 00:05:29.997255 kernel: KASLR disabled due to lack of seed Sep 13 00:05:29.997276 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:05:29.997292 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:05:29.997308 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:05:29.997324 kernel: SMBIOS 3.0.0 present. Sep 13 00:05:29.997340 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Sep 13 00:05:29.997356 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:05:29.997372 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 13 00:05:29.997389 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 13 00:05:29.997409 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 13 00:05:29.997426 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:05:29.997442 kernel: audit: type=2000 audit(0.296:1): state=initialized audit_enabled=0 res=1 Sep 13 00:05:29.997458 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:05:29.997475 kernel: cpuidle: using governor menu Sep 13 00:05:29.997495 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 13 00:05:29.997511 kernel: ASID allocator initialised with 32768 entries Sep 13 00:05:29.997527 kernel: ACPI: bus type PCI registered Sep 13 00:05:29.997543 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:05:29.997560 kernel: Serial: AMBA PL011 UART driver Sep 13 00:05:29.997600 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:05:29.997620 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 13 00:05:29.997636 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:05:29.997652 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 13 00:05:29.997675 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:05:29.997692 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 13 00:05:29.997708 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:05:29.997724 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:05:29.997740 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:05:29.997756 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:05:29.997772 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:05:29.997788 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:05:29.997805 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:05:29.997821 kernel: ACPI: Interpreter enabled Sep 13 00:05:29.997841 kernel: ACPI: Using GIC for interrupt routing Sep 13 00:05:29.997857 kernel: ACPI: MCFG table detected, 1 entries Sep 13 00:05:29.997873 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Sep 13 00:05:29.998166 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 13 00:05:29.998391 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 13 00:05:29.998629 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 13 00:05:29.998827 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Sep 13 00:05:29.999026 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Sep 13 00:05:29.999050 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Sep 13 00:05:29.999067 kernel: acpiphp: Slot [1] registered Sep 13 00:05:29.999083 kernel: acpiphp: Slot [2] registered Sep 13 00:05:29.999099 kernel: acpiphp: Slot [3] registered Sep 13 00:05:29.999116 kernel: acpiphp: Slot [4] registered Sep 13 00:05:29.999132 kernel: acpiphp: Slot [5] registered Sep 13 00:05:29.999148 kernel: acpiphp: Slot [6] registered Sep 13 00:05:29.999164 kernel: acpiphp: Slot [7] registered Sep 13 00:05:29.999185 kernel: acpiphp: Slot [8] registered Sep 13 00:05:29.999201 kernel: acpiphp: Slot [9] registered Sep 13 00:05:29.999217 kernel: acpiphp: Slot [10] registered Sep 13 00:05:29.999233 kernel: acpiphp: Slot [11] registered Sep 13 00:05:29.999249 kernel: acpiphp: Slot [12] registered Sep 13 00:05:29.999265 kernel: acpiphp: Slot [13] registered Sep 13 00:05:29.999281 kernel: acpiphp: Slot [14] registered Sep 13 00:05:29.999298 kernel: acpiphp: Slot [15] registered Sep 13 00:05:29.999313 kernel: acpiphp: Slot [16] registered Sep 13 00:05:29.999334 kernel: acpiphp: Slot [17] registered Sep 13 00:05:29.999350 kernel: acpiphp: Slot [18] registered Sep 13 00:05:29.999366 kernel: acpiphp: Slot [19] registered Sep 13 00:05:29.999382 kernel: acpiphp: Slot [20] registered Sep 13 00:05:29.999398 kernel: acpiphp: Slot [21] registered Sep 13 00:05:29.999414 kernel: acpiphp: Slot [22] registered Sep 13 00:05:29.999430 kernel: acpiphp: Slot [23] registered Sep 13 00:05:29.999446 kernel: acpiphp: Slot [24] registered Sep 13 00:05:29.999462 kernel: acpiphp: Slot [25] registered Sep 13 00:05:29.999478 kernel: acpiphp: Slot [26] registered Sep 13 00:05:29.999498 kernel: acpiphp: Slot [27] registered Sep 13 00:05:29.999514 kernel: acpiphp: Slot [28] registered Sep 13 00:05:29.999530 kernel: acpiphp: Slot [29] registered Sep 13 00:05:29.999546 kernel: acpiphp: Slot [30] registered Sep 13 00:05:29.999562 kernel: acpiphp: Slot [31] registered Sep 13 00:05:29.999608 kernel: PCI host bridge to bus 0000:00 Sep 13 00:05:29.999818 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Sep 13 00:05:30.000001 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Sep 13 00:05:30.000182 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Sep 13 00:05:30.000354 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Sep 13 00:05:30.000590 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Sep 13 00:05:30.010826 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Sep 13 00:05:30.011052 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Sep 13 00:05:30.011295 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Sep 13 00:05:30.011560 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Sep 13 00:05:30.011833 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 00:05:30.012110 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Sep 13 00:05:30.012342 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Sep 13 00:05:30.012543 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Sep 13 00:05:30.014862 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Sep 13 00:05:30.015085 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 00:05:30.015299 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Sep 13 00:05:30.015503 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Sep 13 00:05:30.030716 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Sep 13 00:05:30.030949 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Sep 13 00:05:30.031163 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Sep 13 00:05:30.031363 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Sep 13 00:05:30.031548 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Sep 13 00:05:30.031797 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Sep 13 00:05:30.031822 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Sep 13 00:05:30.031840 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Sep 13 00:05:30.031857 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Sep 13 00:05:30.031874 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Sep 13 00:05:30.031890 kernel: iommu: Default domain type: Translated Sep 13 00:05:30.031906 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 13 00:05:30.031923 kernel: vgaarb: loaded Sep 13 00:05:30.031940 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:05:30.031962 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:05:30.031978 kernel: PTP clock support registered Sep 13 00:05:30.031994 kernel: Registered efivars operations Sep 13 00:05:30.032011 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 13 00:05:30.032027 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:05:30.032043 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:05:30.032060 kernel: pnp: PnP ACPI init Sep 13 00:05:30.032277 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Sep 13 00:05:30.032310 kernel: pnp: PnP ACPI: found 1 devices Sep 13 00:05:30.032327 kernel: NET: Registered PF_INET protocol family Sep 13 00:05:30.032344 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:05:30.032360 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 13 00:05:30.032377 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:05:30.032393 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 00:05:30.032411 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 13 00:05:30.032427 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 13 00:05:30.032443 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 00:05:30.032464 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 00:05:30.032481 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:05:30.032497 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:05:30.032513 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Sep 13 00:05:30.032530 kernel: kvm [1]: HYP mode not available Sep 13 00:05:30.032546 kernel: Initialise system trusted keyrings Sep 13 00:05:30.032563 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 13 00:05:30.032611 kernel: Key type asymmetric registered Sep 13 00:05:30.032629 kernel: Asymmetric key parser 'x509' registered Sep 13 00:05:30.032651 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:05:30.032668 kernel: io scheduler mq-deadline registered Sep 13 00:05:30.032684 kernel: io scheduler kyber registered Sep 13 00:05:30.032701 kernel: io scheduler bfq registered Sep 13 00:05:30.032928 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Sep 13 00:05:30.032957 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Sep 13 00:05:30.032976 kernel: ACPI: button: Power Button [PWRB] Sep 13 00:05:30.032993 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Sep 13 00:05:30.033010 kernel: ACPI: button: Sleep Button [SLPB] Sep 13 00:05:30.033035 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:05:30.033053 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Sep 13 00:05:30.033302 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Sep 13 00:05:30.033335 kernel: printk: console [ttyS0] disabled Sep 13 00:05:30.033353 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Sep 13 00:05:30.033369 kernel: printk: console [ttyS0] enabled Sep 13 00:05:30.033386 kernel: printk: bootconsole [uart0] disabled Sep 13 00:05:30.033402 kernel: thunder_xcv, ver 1.0 Sep 13 00:05:30.033419 kernel: thunder_bgx, ver 1.0 Sep 13 00:05:30.033442 kernel: nicpf, ver 1.0 Sep 13 00:05:30.033458 kernel: nicvf, ver 1.0 Sep 13 00:05:30.039555 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 13 00:05:30.039848 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-13T00:05:29 UTC (1757721929) Sep 13 00:05:30.039877 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:05:30.039895 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:05:30.039912 kernel: Segment Routing with IPv6 Sep 13 00:05:30.039928 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:05:30.039954 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:05:30.039971 kernel: Key type dns_resolver registered Sep 13 00:05:30.039988 kernel: registered taskstats version 1 Sep 13 00:05:30.040004 kernel: Loading compiled-in X.509 certificates Sep 13 00:05:30.040021 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 47ac98e9306f36eebe4291d409359a5a5d0c2b9c' Sep 13 00:05:30.040038 kernel: Key type .fscrypt registered Sep 13 00:05:30.040054 kernel: Key type fscrypt-provisioning registered Sep 13 00:05:30.040070 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:05:30.040086 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:05:30.040107 kernel: ima: No architecture policies found Sep 13 00:05:30.040124 kernel: clk: Disabling unused clocks Sep 13 00:05:30.040140 kernel: Freeing unused kernel memory: 36416K Sep 13 00:05:30.040156 kernel: Run /init as init process Sep 13 00:05:30.040172 kernel: with arguments: Sep 13 00:05:30.040188 kernel: /init Sep 13 00:05:30.040204 kernel: with environment: Sep 13 00:05:30.040219 kernel: HOME=/ Sep 13 00:05:30.040235 kernel: TERM=linux Sep 13 00:05:30.040256 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:05:30.040278 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:05:30.040299 systemd[1]: Detected virtualization amazon. Sep 13 00:05:30.040318 systemd[1]: Detected architecture arm64. Sep 13 00:05:30.040336 systemd[1]: Running in initrd. Sep 13 00:05:30.040353 systemd[1]: No hostname configured, using default hostname. Sep 13 00:05:30.040370 systemd[1]: Hostname set to . Sep 13 00:05:30.040393 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:05:30.040411 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:05:30.040429 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:05:30.040446 systemd[1]: Reached target cryptsetup.target. Sep 13 00:05:30.040463 systemd[1]: Reached target paths.target. Sep 13 00:05:30.040480 systemd[1]: Reached target slices.target. Sep 13 00:05:30.040498 systemd[1]: Reached target swap.target. Sep 13 00:05:30.040515 systemd[1]: Reached target timers.target. Sep 13 00:05:30.040539 systemd[1]: Listening on iscsid.socket. Sep 13 00:05:30.040556 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:05:30.050428 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:05:30.050461 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:05:30.050479 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:05:30.050497 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:05:30.050515 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:05:30.050533 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:05:30.050561 systemd[1]: Reached target sockets.target. Sep 13 00:05:30.050602 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:05:30.050621 systemd[1]: Finished network-cleanup.service. Sep 13 00:05:30.050640 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:05:30.050658 systemd[1]: Starting systemd-journald.service... Sep 13 00:05:30.050676 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:05:30.050695 systemd[1]: Starting systemd-resolved.service... Sep 13 00:05:30.050714 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:05:30.050733 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:05:30.050759 kernel: audit: type=1130 audit(1757721929.999:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.050780 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:05:30.050798 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:05:30.050817 kernel: audit: type=1130 audit(1757721930.017:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.050835 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:05:30.050854 kernel: audit: type=1130 audit(1757721930.036:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.050876 systemd-journald[310]: Journal started Sep 13 00:05:30.050980 systemd-journald[310]: Runtime Journal (/run/log/journal/ec2897a09c5d65b349529f9f504783a4) is 8.0M, max 75.4M, 67.4M free. Sep 13 00:05:29.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:29.991629 systemd-modules-load[311]: Inserted module 'overlay' Sep 13 00:05:30.043181 systemd-resolved[312]: Positive Trust Anchors: Sep 13 00:05:30.043196 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:05:30.043249 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:05:30.075612 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:05:30.091848 systemd[1]: Started systemd-journald.service. Sep 13 00:05:30.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.106609 kernel: audit: type=1130 audit(1757721930.096:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.113250 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:05:30.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.132611 kernel: audit: type=1130 audit(1757721930.112:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.133104 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:05:30.138425 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:05:30.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.160610 kernel: audit: type=1130 audit(1757721930.133:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.160685 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:05:30.175781 systemd-modules-load[311]: Inserted module 'br_netfilter' Sep 13 00:05:30.177889 kernel: Bridge firewalling registered Sep 13 00:05:30.179619 dracut-cmdline[326]: dracut-dracut-053 Sep 13 00:05:30.186057 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 00:05:30.215505 kernel: SCSI subsystem initialized Sep 13 00:05:30.234597 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:05:30.241140 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:05:30.241219 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:05:30.248430 systemd-modules-load[311]: Inserted module 'dm_multipath' Sep 13 00:05:30.252649 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:05:30.265922 kernel: audit: type=1130 audit(1757721930.253:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.263261 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:05:30.295933 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:05:30.307231 kernel: audit: type=1130 audit(1757721930.296:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.378611 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:05:30.400616 kernel: iscsi: registered transport (tcp) Sep 13 00:05:30.429815 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:05:30.429898 kernel: QLogic iSCSI HBA Driver Sep 13 00:05:30.594617 systemd-resolved[312]: Defaulting to hostname 'linux'. Sep 13 00:05:30.597598 kernel: random: crng init done Sep 13 00:05:30.599487 systemd[1]: Started systemd-resolved.service. Sep 13 00:05:30.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.608313 systemd[1]: Reached target nss-lookup.target. Sep 13 00:05:30.619618 kernel: audit: type=1130 audit(1757721930.606:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.632063 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:05:30.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:30.635938 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:05:30.705632 kernel: raid6: neonx8 gen() 6303 MB/s Sep 13 00:05:30.723631 kernel: raid6: neonx8 xor() 4724 MB/s Sep 13 00:05:30.741633 kernel: raid6: neonx4 gen() 6423 MB/s Sep 13 00:05:30.759631 kernel: raid6: neonx4 xor() 4839 MB/s Sep 13 00:05:30.777632 kernel: raid6: neonx2 gen() 5689 MB/s Sep 13 00:05:30.795635 kernel: raid6: neonx2 xor() 4458 MB/s Sep 13 00:05:30.813634 kernel: raid6: neonx1 gen() 4381 MB/s Sep 13 00:05:30.831626 kernel: raid6: neonx1 xor() 3640 MB/s Sep 13 00:05:30.849636 kernel: raid6: int64x8 gen() 3363 MB/s Sep 13 00:05:30.867629 kernel: raid6: int64x8 xor() 2063 MB/s Sep 13 00:05:30.885639 kernel: raid6: int64x4 gen() 3744 MB/s Sep 13 00:05:30.903629 kernel: raid6: int64x4 xor() 2164 MB/s Sep 13 00:05:30.921625 kernel: raid6: int64x2 gen() 3555 MB/s Sep 13 00:05:30.939626 kernel: raid6: int64x2 xor() 1930 MB/s Sep 13 00:05:30.957639 kernel: raid6: int64x1 gen() 2736 MB/s Sep 13 00:05:30.977208 kernel: raid6: int64x1 xor() 1437 MB/s Sep 13 00:05:30.977278 kernel: raid6: using algorithm neonx4 gen() 6423 MB/s Sep 13 00:05:30.977304 kernel: raid6: .... xor() 4839 MB/s, rmw enabled Sep 13 00:05:30.979084 kernel: raid6: using neon recovery algorithm Sep 13 00:05:31.000812 kernel: xor: measuring software checksum speed Sep 13 00:05:31.000890 kernel: 8regs : 9331 MB/sec Sep 13 00:05:31.002749 kernel: 32regs : 11016 MB/sec Sep 13 00:05:31.004711 kernel: arm64_neon : 9185 MB/sec Sep 13 00:05:31.004758 kernel: xor: using function: 32regs (11016 MB/sec) Sep 13 00:05:31.105631 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 13 00:05:31.124068 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:05:31.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:31.125000 audit: BPF prog-id=7 op=LOAD Sep 13 00:05:31.125000 audit: BPF prog-id=8 op=LOAD Sep 13 00:05:31.129639 systemd[1]: Starting systemd-udevd.service... Sep 13 00:05:31.160222 systemd-udevd[508]: Using default interface naming scheme 'v252'. Sep 13 00:05:31.169418 systemd[1]: Started systemd-udevd.service. Sep 13 00:05:31.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:31.171142 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:05:31.206434 dracut-pre-trigger[509]: rd.md=0: removing MD RAID activation Sep 13 00:05:31.268444 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:05:31.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:31.273842 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:05:31.381105 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:05:31.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:31.525435 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Sep 13 00:05:31.525511 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Sep 13 00:05:31.542376 kernel: ena 0000:00:05.0: ENA device version: 0.10 Sep 13 00:05:31.542696 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Sep 13 00:05:31.542926 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:3d:06:dc:f9:f9 Sep 13 00:05:31.545665 (udev-worker)[564]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:05:31.551791 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Sep 13 00:05:31.551826 kernel: nvme nvme0: pci function 0000:00:04.0 Sep 13 00:05:31.560608 kernel: nvme nvme0: 2/0/0 default/read/poll queues Sep 13 00:05:31.571949 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 13 00:05:31.572019 kernel: GPT:9289727 != 16777215 Sep 13 00:05:31.574351 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 13 00:05:31.575807 kernel: GPT:9289727 != 16777215 Sep 13 00:05:31.577846 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 13 00:05:31.579489 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:05:31.648610 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (570) Sep 13 00:05:31.747947 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:05:31.769424 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:05:31.785758 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:05:31.798873 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:05:31.804661 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:05:31.820603 systemd[1]: Starting disk-uuid.service... Sep 13 00:05:31.835699 disk-uuid[667]: Primary Header is updated. Sep 13 00:05:31.835699 disk-uuid[667]: Secondary Entries is updated. Sep 13 00:05:31.835699 disk-uuid[667]: Secondary Header is updated. Sep 13 00:05:31.846600 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:05:32.866608 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:05:32.867466 disk-uuid[668]: The operation has completed successfully. Sep 13 00:05:33.052560 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:05:33.052800 systemd[1]: Finished disk-uuid.service. Sep 13 00:05:33.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.078940 systemd[1]: Starting verity-setup.service... Sep 13 00:05:33.106774 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 13 00:05:33.208459 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:05:33.214360 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:05:33.223559 systemd[1]: Finished verity-setup.service. Sep 13 00:05:33.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.315638 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:05:33.316399 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:05:33.319964 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:05:33.324081 systemd[1]: Starting ignition-setup.service... Sep 13 00:05:33.330223 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:05:33.367469 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:05:33.367541 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:05:33.367601 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:05:33.380637 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:05:33.405069 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:05:33.426121 systemd[1]: Finished ignition-setup.service. Sep 13 00:05:33.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.431128 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:05:33.508911 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:05:33.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.514000 audit: BPF prog-id=9 op=LOAD Sep 13 00:05:33.518230 systemd[1]: Starting systemd-networkd.service... Sep 13 00:05:33.571934 systemd-networkd[1181]: lo: Link UP Sep 13 00:05:33.571955 systemd-networkd[1181]: lo: Gained carrier Sep 13 00:05:33.576122 systemd-networkd[1181]: Enumeration completed Sep 13 00:05:33.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.576694 systemd-networkd[1181]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:05:33.576920 systemd[1]: Started systemd-networkd.service. Sep 13 00:05:33.579093 systemd[1]: Reached target network.target. Sep 13 00:05:33.591093 systemd[1]: Starting iscsiuio.service... Sep 13 00:05:33.594545 systemd-networkd[1181]: eth0: Link UP Sep 13 00:05:33.594554 systemd-networkd[1181]: eth0: Gained carrier Sep 13 00:05:33.610851 systemd[1]: Started iscsiuio.service. Sep 13 00:05:33.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.618769 systemd-networkd[1181]: eth0: DHCPv4 address 172.31.31.136/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:05:33.626653 systemd[1]: Starting iscsid.service... Sep 13 00:05:33.631898 iscsid[1186]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:05:33.631898 iscsid[1186]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:05:33.631898 iscsid[1186]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:05:33.631898 iscsid[1186]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:05:33.631898 iscsid[1186]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:05:33.654040 iscsid[1186]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:05:33.662020 systemd[1]: Started iscsid.service. Sep 13 00:05:33.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.673036 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:05:33.700465 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:05:33.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.704177 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:05:33.724561 kernel: kauditd_printk_skb: 16 callbacks suppressed Sep 13 00:05:33.724616 kernel: audit: type=1130 audit(1757721933.702:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.714995 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:05:33.716979 systemd[1]: Reached target remote-fs.target. Sep 13 00:05:33.727257 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:05:33.748056 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:05:33.758997 kernel: audit: type=1130 audit(1757721933.748:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:33.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.198318 ignition[1127]: Ignition 2.14.0 Sep 13 00:05:34.198346 ignition[1127]: Stage: fetch-offline Sep 13 00:05:34.198906 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:05:34.198969 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:05:34.225275 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:05:34.226351 ignition[1127]: Ignition finished successfully Sep 13 00:05:34.231317 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:05:34.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.234837 systemd[1]: Starting ignition-fetch.service... Sep 13 00:05:34.246623 kernel: audit: type=1130 audit(1757721934.231:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.253466 ignition[1205]: Ignition 2.14.0 Sep 13 00:05:34.253493 ignition[1205]: Stage: fetch Sep 13 00:05:34.253826 ignition[1205]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:05:34.253886 ignition[1205]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:05:34.270437 ignition[1205]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:05:34.273111 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:05:34.294951 ignition[1205]: INFO : PUT result: OK Sep 13 00:05:34.299955 ignition[1205]: DEBUG : parsed url from cmdline: "" Sep 13 00:05:34.302404 ignition[1205]: INFO : no config URL provided Sep 13 00:05:34.302404 ignition[1205]: INFO : reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:05:34.302404 ignition[1205]: INFO : no config at "/usr/lib/ignition/user.ign" Sep 13 00:05:34.302404 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:05:34.314806 ignition[1205]: INFO : PUT result: OK Sep 13 00:05:34.314806 ignition[1205]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Sep 13 00:05:34.319377 ignition[1205]: INFO : GET result: OK Sep 13 00:05:34.321205 ignition[1205]: DEBUG : parsing config with SHA512: 7b925e018966894283b57309f12896118e4015c0e24702abb629759050254cbf65a52beb4d58d2a75e50f701be724c1fdf7ba735c4e99164496d96ff3f291d35 Sep 13 00:05:34.330763 unknown[1205]: fetched base config from "system" Sep 13 00:05:34.330798 unknown[1205]: fetched base config from "system" Sep 13 00:05:34.330815 unknown[1205]: fetched user config from "aws" Sep 13 00:05:34.336840 ignition[1205]: fetch: fetch complete Sep 13 00:05:34.336868 ignition[1205]: fetch: fetch passed Sep 13 00:05:34.339887 ignition[1205]: Ignition finished successfully Sep 13 00:05:34.342651 systemd[1]: Finished ignition-fetch.service. Sep 13 00:05:34.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.360062 systemd[1]: Starting ignition-kargs.service... Sep 13 00:05:34.364647 kernel: audit: type=1130 audit(1757721934.350:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.379216 ignition[1211]: Ignition 2.14.0 Sep 13 00:05:34.379244 ignition[1211]: Stage: kargs Sep 13 00:05:34.379551 ignition[1211]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:05:34.379644 ignition[1211]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:05:34.394436 ignition[1211]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:05:34.397197 ignition[1211]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:05:34.400634 ignition[1211]: INFO : PUT result: OK Sep 13 00:05:34.405505 ignition[1211]: kargs: kargs passed Sep 13 00:05:34.405630 ignition[1211]: Ignition finished successfully Sep 13 00:05:34.410085 systemd[1]: Finished ignition-kargs.service. Sep 13 00:05:34.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.414837 systemd[1]: Starting ignition-disks.service... Sep 13 00:05:34.424703 kernel: audit: type=1130 audit(1757721934.412:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.432808 ignition[1217]: Ignition 2.14.0 Sep 13 00:05:34.434752 ignition[1217]: Stage: disks Sep 13 00:05:34.436598 ignition[1217]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:05:34.439355 ignition[1217]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:05:34.456226 ignition[1217]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:05:34.458893 ignition[1217]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:05:34.461976 ignition[1217]: INFO : PUT result: OK Sep 13 00:05:34.467047 ignition[1217]: disks: disks passed Sep 13 00:05:34.467174 ignition[1217]: Ignition finished successfully Sep 13 00:05:34.483565 kernel: audit: type=1130 audit(1757721934.472:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.470848 systemd[1]: Finished ignition-disks.service. Sep 13 00:05:34.483709 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:05:34.488747 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:05:34.492125 systemd[1]: Reached target local-fs.target. Sep 13 00:05:34.495320 systemd[1]: Reached target sysinit.target. Sep 13 00:05:34.498362 systemd[1]: Reached target basic.target. Sep 13 00:05:34.503114 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:05:34.537878 systemd-fsck[1225]: ROOT: clean, 629/553520 files, 56027/553472 blocks Sep 13 00:05:34.548381 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:05:34.561023 kernel: audit: type=1130 audit(1757721934.546:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.554465 systemd[1]: Mounting sysroot.mount... Sep 13 00:05:34.580613 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:05:34.584024 systemd[1]: Mounted sysroot.mount. Sep 13 00:05:34.595484 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:05:34.601468 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:05:34.607526 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 13 00:05:34.607818 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:05:34.607879 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:05:34.624703 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:05:34.650958 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:05:34.656186 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:05:34.668887 initrd-setup-root[1247]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:05:34.678381 initrd-setup-root[1255]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:05:34.693629 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1242) Sep 13 00:05:34.700412 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:05:34.700476 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:05:34.703045 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:05:34.703113 initrd-setup-root[1263]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:05:34.712321 initrd-setup-root[1287]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:05:34.718598 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:05:34.724099 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:05:34.923832 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:05:34.940624 kernel: audit: type=1130 audit(1757721934.922:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:34.930958 systemd[1]: Starting ignition-mount.service... Sep 13 00:05:34.943888 systemd[1]: Starting sysroot-boot.service... Sep 13 00:05:34.956086 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:05:34.956274 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:05:34.981005 ignition[1308]: INFO : Ignition 2.14.0 Sep 13 00:05:34.981005 ignition[1308]: INFO : Stage: mount Sep 13 00:05:34.984685 ignition[1308]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:05:34.984685 ignition[1308]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:05:35.004386 ignition[1308]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:05:35.007086 ignition[1308]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:05:35.011034 systemd[1]: Finished sysroot-boot.service. Sep 13 00:05:35.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:35.017454 ignition[1308]: INFO : PUT result: OK Sep 13 00:05:35.025884 kernel: audit: type=1130 audit(1757721935.015:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:35.025734 systemd[1]: Finished ignition-mount.service. Sep 13 00:05:35.027642 ignition[1308]: INFO : mount: mount passed Sep 13 00:05:35.027642 ignition[1308]: INFO : Ignition finished successfully Sep 13 00:05:35.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:35.040838 kernel: audit: type=1130 audit(1757721935.029:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:35.032474 systemd[1]: Starting ignition-files.service... Sep 13 00:05:35.052204 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:05:35.077619 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1317) Sep 13 00:05:35.083357 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:05:35.083416 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:05:35.085630 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:05:35.093604 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:05:35.099221 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:05:35.117590 ignition[1336]: INFO : Ignition 2.14.0 Sep 13 00:05:35.117590 ignition[1336]: INFO : Stage: files Sep 13 00:05:35.123448 ignition[1336]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:05:35.123448 ignition[1336]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:05:35.129870 systemd-networkd[1181]: eth0: Gained IPv6LL Sep 13 00:05:35.139797 ignition[1336]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:05:35.143231 ignition[1336]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:05:35.146616 ignition[1336]: INFO : PUT result: OK Sep 13 00:05:35.152058 ignition[1336]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:05:35.158549 ignition[1336]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:05:35.158549 ignition[1336]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:05:35.196996 ignition[1336]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:05:35.202496 ignition[1336]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:05:35.207832 unknown[1336]: wrote ssh authorized keys file for user: core Sep 13 00:05:35.210980 ignition[1336]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:05:35.210980 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:05:35.210980 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:05:35.229800 ignition[1336]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2852965009" Sep 13 00:05:35.232943 ignition[1336]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2852965009": device or resource busy Sep 13 00:05:35.232943 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2852965009", trying btrfs: device or resource busy Sep 13 00:05:35.232943 ignition[1336]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2852965009" Sep 13 00:05:35.244060 ignition[1336]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2852965009" Sep 13 00:05:35.248999 ignition[1336]: INFO : op(3): [started] unmounting "/mnt/oem2852965009" Sep 13 00:05:35.251634 ignition[1336]: INFO : op(3): [finished] unmounting "/mnt/oem2852965009" Sep 13 00:05:35.251634 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:05:35.251634 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:05:35.262356 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:05:35.262356 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:05:35.270359 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:05:35.270359 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 00:05:35.270359 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 00:05:35.270359 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:05:35.289517 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:05:35.303691 ignition[1336]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244858804" Sep 13 00:05:35.303691 ignition[1336]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244858804": device or resource busy Sep 13 00:05:35.303691 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1244858804", trying btrfs: device or resource busy Sep 13 00:05:35.303691 ignition[1336]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244858804" Sep 13 00:05:35.303691 ignition[1336]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244858804" Sep 13 00:05:35.303691 ignition[1336]: INFO : op(6): [started] unmounting "/mnt/oem1244858804" Sep 13 00:05:35.303691 ignition[1336]: INFO : op(6): [finished] unmounting "/mnt/oem1244858804" Sep 13 00:05:35.303691 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:05:35.303691 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:05:35.303691 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:05:35.348298 ignition[1336]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem844965383" Sep 13 00:05:35.351635 ignition[1336]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem844965383": device or resource busy Sep 13 00:05:35.351635 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem844965383", trying btrfs: device or resource busy Sep 13 00:05:35.351635 ignition[1336]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem844965383" Sep 13 00:05:35.363437 ignition[1336]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem844965383" Sep 13 00:05:35.363437 ignition[1336]: INFO : op(9): [started] unmounting "/mnt/oem844965383" Sep 13 00:05:35.363437 ignition[1336]: INFO : op(9): [finished] unmounting "/mnt/oem844965383" Sep 13 00:05:35.363437 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:05:35.363437 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:05:35.363437 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:05:35.394451 ignition[1336]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1686772272" Sep 13 00:05:35.394451 ignition[1336]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1686772272": device or resource busy Sep 13 00:05:35.394451 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1686772272", trying btrfs: device or resource busy Sep 13 00:05:35.394451 ignition[1336]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1686772272" Sep 13 00:05:35.394451 ignition[1336]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1686772272" Sep 13 00:05:35.394451 ignition[1336]: INFO : op(c): [started] unmounting "/mnt/oem1686772272" Sep 13 00:05:35.415989 ignition[1336]: INFO : op(c): [finished] unmounting "/mnt/oem1686772272" Sep 13 00:05:35.415989 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:05:35.415989 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 00:05:35.415989 ignition[1336]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 Sep 13 00:05:35.723102 ignition[1336]: INFO : GET result: OK Sep 13 00:05:36.183728 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(e): [started] processing unit "nvidia.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(e): [finished] processing unit "nvidia.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(f): [started] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(f): [finished] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(10): [started] setting preset to enabled for "nvidia.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(10): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:05:36.188433 ignition[1336]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:05:36.240382 ignition[1336]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:05:36.240382 ignition[1336]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:05:36.240382 ignition[1336]: INFO : files: files passed Sep 13 00:05:36.240382 ignition[1336]: INFO : Ignition finished successfully Sep 13 00:05:36.252940 systemd[1]: Finished ignition-files.service. Sep 13 00:05:36.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.268786 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:05:36.278264 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:05:36.284668 systemd[1]: Starting ignition-quench.service... Sep 13 00:05:36.293836 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:05:36.294845 systemd[1]: Finished ignition-quench.service. Sep 13 00:05:36.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.308267 initrd-setup-root-after-ignition[1361]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:05:36.312838 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:05:36.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.317245 systemd[1]: Reached target ignition-complete.target. Sep 13 00:05:36.322167 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:05:36.357473 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:05:36.358091 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:05:36.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.363726 systemd[1]: Reached target initrd-fs.target. Sep 13 00:05:36.368334 systemd[1]: Reached target initrd.target. Sep 13 00:05:36.371431 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:05:36.375694 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:05:36.397959 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:05:36.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.406161 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:05:36.434507 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:05:36.438021 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:05:36.442783 systemd[1]: Stopped target timers.target. Sep 13 00:05:36.446061 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:05:36.447007 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:05:36.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.452629 systemd[1]: Stopped target initrd.target. Sep 13 00:05:36.455746 systemd[1]: Stopped target basic.target. Sep 13 00:05:36.459234 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:05:36.462888 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:05:36.466693 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:05:36.470454 systemd[1]: Stopped target remote-fs.target. Sep 13 00:05:36.473783 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:05:36.477406 systemd[1]: Stopped target sysinit.target. Sep 13 00:05:36.480729 systemd[1]: Stopped target local-fs.target. Sep 13 00:05:36.484031 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:05:36.487656 systemd[1]: Stopped target swap.target. Sep 13 00:05:36.491030 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:05:36.491289 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:05:36.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.496834 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:05:36.500305 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:05:36.501242 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:05:36.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.506000 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:05:36.506420 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:05:36.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.512790 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:05:36.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.512894 systemd[1]: Stopped ignition-files.service. Sep 13 00:05:36.521412 systemd[1]: Stopping ignition-mount.service... Sep 13 00:05:36.538825 systemd[1]: Stopping iscsid.service... Sep 13 00:05:36.546443 iscsid[1186]: iscsid shutting down. Sep 13 00:05:36.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.546981 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:05:36.566866 ignition[1374]: INFO : Ignition 2.14.0 Sep 13 00:05:36.566866 ignition[1374]: INFO : Stage: umount Sep 13 00:05:36.566866 ignition[1374]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:05:36.566866 ignition[1374]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:05:36.566866 ignition[1374]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:05:36.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.555013 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:05:36.604780 ignition[1374]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:05:36.604780 ignition[1374]: INFO : PUT result: OK Sep 13 00:05:36.604780 ignition[1374]: INFO : umount: umount passed Sep 13 00:05:36.604780 ignition[1374]: INFO : Ignition finished successfully Sep 13 00:05:36.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.555163 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:05:36.559565 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:05:36.559694 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:05:36.600509 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:05:36.608479 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:05:36.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.608774 systemd[1]: Stopped iscsid.service. Sep 13 00:05:36.621528 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:05:36.623295 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:05:36.634318 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:05:36.636533 systemd[1]: Stopped ignition-mount.service. Sep 13 00:05:36.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.640154 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:05:36.642347 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:05:36.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.645820 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:05:36.645925 systemd[1]: Stopped ignition-disks.service. Sep 13 00:05:36.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.651200 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:05:36.651290 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:05:36.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.655160 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:05:36.656782 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:05:36.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.661851 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:05:36.661933 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:05:36.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.667776 systemd[1]: Stopped target paths.target. Sep 13 00:05:36.667874 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:05:36.674679 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:05:36.678488 systemd[1]: Stopped target slices.target. Sep 13 00:05:36.681602 systemd[1]: Stopped target sockets.target. Sep 13 00:05:36.684961 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:05:36.685065 systemd[1]: Closed iscsid.socket. Sep 13 00:05:36.688394 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:05:36.689819 systemd[1]: Stopped ignition-setup.service. Sep 13 00:05:36.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.695135 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:05:36.695248 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:05:36.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.701032 systemd[1]: Stopping iscsiuio.service... Sep 13 00:05:36.706923 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:05:36.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.707107 systemd[1]: Stopped iscsiuio.service. Sep 13 00:05:36.708934 systemd[1]: Stopped target network.target. Sep 13 00:05:36.710689 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:05:36.710758 systemd[1]: Closed iscsiuio.socket. Sep 13 00:05:36.712631 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:05:36.714440 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:05:36.719851 systemd-networkd[1181]: eth0: DHCPv6 lease lost Sep 13 00:05:36.730484 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:05:36.734356 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:05:36.736000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:05:36.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.738496 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:05:36.740835 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:05:36.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.744770 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:05:36.744853 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:05:36.746000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:05:36.751245 systemd[1]: Stopping network-cleanup.service... Sep 13 00:05:36.756711 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:05:36.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.756833 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:05:36.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.760583 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:05:36.760744 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:05:36.764929 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:05:36.765017 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:05:36.773191 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:05:36.785752 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:05:36.796422 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:05:36.796758 systemd[1]: Stopped network-cleanup.service. Sep 13 00:05:36.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.803754 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:05:36.804475 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:05:36.809851 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:05:36.810108 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:05:36.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.815972 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:05:36.816066 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:05:36.819907 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:05:36.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.821533 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:05:36.828554 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:05:36.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.828670 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:05:36.833832 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:05:36.833918 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:05:36.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.842079 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:05:36.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.854344 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 13 00:05:36.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.854471 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 13 00:05:36.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:36.860434 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:05:36.860531 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:05:36.860753 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:05:36.860829 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:05:36.868875 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 13 00:05:36.869794 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:05:36.869999 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:05:36.872426 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:05:36.875728 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:05:36.907098 systemd[1]: Switching root. Sep 13 00:05:36.934793 systemd-journald[310]: Journal stopped Sep 13 00:05:42.959193 systemd-journald[310]: Received SIGTERM from PID 1 (systemd). Sep 13 00:05:42.959325 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:05:42.959368 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:05:42.959410 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:05:42.959443 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:05:42.959481 kernel: SELinux: policy capability open_perms=1 Sep 13 00:05:42.959511 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:05:42.959543 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:05:42.959590 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:05:42.959628 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:05:42.959665 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:05:42.959698 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:05:42.959731 systemd[1]: Successfully loaded SELinux policy in 137.473ms. Sep 13 00:05:42.959782 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.832ms. Sep 13 00:05:42.959819 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:05:42.959852 systemd[1]: Detected virtualization amazon. Sep 13 00:05:42.959886 systemd[1]: Detected architecture arm64. Sep 13 00:05:42.959920 systemd[1]: Detected first boot. Sep 13 00:05:42.959957 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:05:42.959989 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:05:42.960019 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:05:42.960049 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:05:42.960084 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:05:42.960116 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:05:42.960152 kernel: kauditd_printk_skb: 59 callbacks suppressed Sep 13 00:05:42.960186 kernel: audit: type=1334 audit(1757721942.467:89): prog-id=12 op=LOAD Sep 13 00:05:42.960216 kernel: audit: type=1334 audit(1757721942.467:90): prog-id=3 op=UNLOAD Sep 13 00:05:42.960244 kernel: audit: type=1334 audit(1757721942.470:91): prog-id=13 op=LOAD Sep 13 00:05:42.960275 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:05:42.960306 kernel: audit: type=1334 audit(1757721942.472:92): prog-id=14 op=LOAD Sep 13 00:05:42.960335 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:05:42.960366 kernel: audit: type=1334 audit(1757721942.472:93): prog-id=4 op=UNLOAD Sep 13 00:05:42.960394 kernel: audit: type=1334 audit(1757721942.472:94): prog-id=5 op=UNLOAD Sep 13 00:05:42.960429 kernel: audit: type=1131 audit(1757721942.475:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.960459 kernel: audit: type=1334 audit(1757721942.487:96): prog-id=12 op=UNLOAD Sep 13 00:05:42.960489 kernel: audit: type=1130 audit(1757721942.505:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.960520 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:05:42.960552 kernel: audit: type=1131 audit(1757721942.505:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.960610 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:05:42.960645 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:05:42.960681 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 13 00:05:42.960715 systemd[1]: Created slice system-getty.slice. Sep 13 00:05:42.960744 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:05:42.960777 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:05:42.960807 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:05:42.960841 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:05:42.960873 systemd[1]: Created slice user.slice. Sep 13 00:05:42.960905 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:05:42.960939 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:05:42.960971 systemd[1]: Set up automount boot.automount. Sep 13 00:05:42.961002 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:05:42.961034 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:05:42.961065 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:05:42.961095 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:05:42.961128 systemd[1]: Reached target integritysetup.target. Sep 13 00:05:42.961157 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:05:42.961191 systemd[1]: Reached target remote-fs.target. Sep 13 00:05:42.961225 systemd[1]: Reached target slices.target. Sep 13 00:05:42.962018 systemd[1]: Reached target swap.target. Sep 13 00:05:42.962062 systemd[1]: Reached target torcx.target. Sep 13 00:05:42.962095 systemd[1]: Reached target veritysetup.target. Sep 13 00:05:42.962125 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:05:42.962157 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:05:42.962210 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:05:42.962247 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:05:42.962277 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:05:42.962308 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:05:42.962345 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:05:42.962374 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:05:42.962404 systemd[1]: Mounting media.mount... Sep 13 00:05:42.962701 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:05:42.962744 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:05:42.962775 systemd[1]: Mounting tmp.mount... Sep 13 00:05:42.962805 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:05:42.962835 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:05:42.962864 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:05:42.962900 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:05:42.962930 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:05:42.962959 systemd[1]: Starting modprobe@drm.service... Sep 13 00:05:42.962991 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:05:42.963022 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:05:42.963059 systemd[1]: Starting modprobe@loop.service... Sep 13 00:05:42.963091 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:05:42.963258 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:05:42.963297 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:05:42.963388 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:05:42.965109 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:05:42.965151 systemd[1]: Stopped systemd-journald.service. Sep 13 00:05:42.965184 systemd[1]: Starting systemd-journald.service... Sep 13 00:05:42.965214 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:05:42.965243 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:05:42.965273 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:05:42.965303 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:05:42.965336 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:05:42.965374 systemd[1]: Stopped verity-setup.service. Sep 13 00:05:42.965403 kernel: loop: module loaded Sep 13 00:05:42.965601 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:05:42.965643 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:05:42.965673 systemd[1]: Mounted media.mount. Sep 13 00:05:42.965702 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:05:42.965732 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:05:42.965762 systemd[1]: Mounted tmp.mount. Sep 13 00:05:42.965792 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:05:42.965830 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:05:42.965861 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:05:42.965891 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:05:42.965920 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:05:42.965949 kernel: fuse: init (API version 7.34) Sep 13 00:05:42.966188 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:05:42.966251 systemd[1]: Finished modprobe@drm.service. Sep 13 00:05:42.966282 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:05:42.966314 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:05:42.966344 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:05:42.966374 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:05:42.966406 systemd-journald[1485]: Journal started Sep 13 00:05:42.966516 systemd-journald[1485]: Runtime Journal (/run/log/journal/ec2897a09c5d65b349529f9f504783a4) is 8.0M, max 75.4M, 67.4M free. Sep 13 00:05:42.970631 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:05:37.763000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:05:37.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:05:37.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:05:37.958000 audit: BPF prog-id=10 op=LOAD Sep 13 00:05:37.958000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:05:37.958000 audit: BPF prog-id=11 op=LOAD Sep 13 00:05:37.958000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:05:38.192000 audit[1407]: AVC avc: denied { associate } for pid=1407 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:05:38.192000 audit[1407]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1390 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:38.192000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:05:38.197000 audit[1407]: AVC avc: denied { associate } for pid=1407 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:05:38.197000 audit[1407]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1390 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:38.197000 audit: CWD cwd="/" Sep 13 00:05:38.197000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:05:38.197000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:05:38.197000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:05:42.467000 audit: BPF prog-id=12 op=LOAD Sep 13 00:05:42.467000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:05:42.470000 audit: BPF prog-id=13 op=LOAD Sep 13 00:05:42.472000 audit: BPF prog-id=14 op=LOAD Sep 13 00:05:42.472000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:05:42.472000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:05:42.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.487000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:05:42.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.818000 audit: BPF prog-id=15 op=LOAD Sep 13 00:05:42.818000 audit: BPF prog-id=16 op=LOAD Sep 13 00:05:42.819000 audit: BPF prog-id=17 op=LOAD Sep 13 00:05:42.819000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:05:42.819000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:05:42.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.973366 systemd[1]: Finished modprobe@loop.service. Sep 13 00:05:42.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.950000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:05:42.950000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffd4c3f1b0 a2=4000 a3=1 items=0 ppid=1 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:42.950000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:05:42.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:38.179631 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:05:42.464683 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:05:38.180872 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:05:42.464706 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Sep 13 00:05:38.180925 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:05:42.476291 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:05:38.181000 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:05:42.981490 systemd[1]: Started systemd-journald.service. Sep 13 00:05:42.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:38.181027 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:05:42.981696 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:05:38.181105 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:05:38.181139 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:05:38.181635 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:05:38.181737 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:05:38.181776 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:05:38.192800 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:05:38.192894 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:05:38.192946 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:05:38.192988 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:05:38.193044 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:05:38.193111 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:05:41.551946 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:05:41.552507 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:05:41.552866 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:05:41.553365 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:05:41.553494 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:05:41.553692 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2025-09-13T00:05:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:05:42.988076 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:05:42.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.990924 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:05:42.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:42.994451 systemd[1]: Reached target network-pre.target. Sep 13 00:05:43.000789 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:05:43.005193 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:05:43.010685 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:05:43.014331 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:05:43.019118 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:05:43.021710 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:05:43.024618 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:05:43.026562 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:05:43.028810 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:05:43.035739 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:05:43.038758 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:05:43.058332 systemd-journald[1485]: Time spent on flushing to /var/log/journal/ec2897a09c5d65b349529f9f504783a4 is 77.505ms for 1113 entries. Sep 13 00:05:43.058332 systemd-journald[1485]: System Journal (/var/log/journal/ec2897a09c5d65b349529f9f504783a4) is 8.0M, max 195.6M, 187.6M free. Sep 13 00:05:43.150369 systemd-journald[1485]: Received client request to flush runtime journal. Sep 13 00:05:43.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.082472 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:05:43.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.087328 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:05:43.089682 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:05:43.151989 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:05:43.169178 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:05:43.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.173531 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:05:43.205504 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:05:43.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.212810 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:05:43.228895 udevadm[1526]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 00:05:43.321845 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:05:43.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.326417 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:05:43.463322 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:05:43.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:43.955000 audit: BPF prog-id=18 op=LOAD Sep 13 00:05:43.956000 audit: BPF prog-id=19 op=LOAD Sep 13 00:05:43.956000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:05:43.956000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:05:43.954229 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:05:43.959038 systemd[1]: Starting systemd-udevd.service... Sep 13 00:05:43.998340 systemd-udevd[1529]: Using default interface naming scheme 'v252'. Sep 13 00:05:44.052354 systemd[1]: Started systemd-udevd.service. Sep 13 00:05:44.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.054000 audit: BPF prog-id=20 op=LOAD Sep 13 00:05:44.057905 systemd[1]: Starting systemd-networkd.service... Sep 13 00:05:44.068000 audit: BPF prog-id=21 op=LOAD Sep 13 00:05:44.069000 audit: BPF prog-id=22 op=LOAD Sep 13 00:05:44.069000 audit: BPF prog-id=23 op=LOAD Sep 13 00:05:44.072149 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:05:44.161630 systemd[1]: Started systemd-userdbd.service. Sep 13 00:05:44.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.167086 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:05:44.167907 (udev-worker)[1544]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:05:44.382740 systemd-networkd[1534]: lo: Link UP Sep 13 00:05:44.382764 systemd-networkd[1534]: lo: Gained carrier Sep 13 00:05:44.383777 systemd-networkd[1534]: Enumeration completed Sep 13 00:05:44.383948 systemd[1]: Started systemd-networkd.service. Sep 13 00:05:44.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.388048 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:05:44.391742 systemd-networkd[1534]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:05:44.401620 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:05:44.402050 systemd-networkd[1534]: eth0: Link UP Sep 13 00:05:44.402409 systemd-networkd[1534]: eth0: Gained carrier Sep 13 00:05:44.420840 systemd-networkd[1534]: eth0: DHCPv4 address 172.31.31.136/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:05:44.526273 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:05:44.529164 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:05:44.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.533456 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:05:44.595919 lvm[1648]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:05:44.631182 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:05:44.633456 systemd[1]: Reached target cryptsetup.target. Sep 13 00:05:44.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.637723 systemd[1]: Starting lvm2-activation.service... Sep 13 00:05:44.646436 lvm[1649]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:05:44.687281 systemd[1]: Finished lvm2-activation.service. Sep 13 00:05:44.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.689399 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:05:44.691394 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:05:44.691457 systemd[1]: Reached target local-fs.target. Sep 13 00:05:44.693277 systemd[1]: Reached target machines.target. Sep 13 00:05:44.697166 systemd[1]: Starting ldconfig.service... Sep 13 00:05:44.699812 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:05:44.699958 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:05:44.702261 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:05:44.706297 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:05:44.711932 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:05:44.716325 systemd[1]: Starting systemd-sysext.service... Sep 13 00:05:44.727979 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1651 (bootctl) Sep 13 00:05:44.730379 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:05:44.761376 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:05:44.775668 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:05:44.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.780114 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:05:44.780536 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:05:44.807663 kernel: loop0: detected capacity change from 0 to 207008 Sep 13 00:05:44.910134 systemd-fsck[1660]: fsck.fat 4.2 (2021-01-31) Sep 13 00:05:44.910134 systemd-fsck[1660]: /dev/nvme0n1p1: 236 files, 117310/258078 clusters Sep 13 00:05:44.913443 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:05:44.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:44.919326 systemd[1]: Mounting boot.mount... Sep 13 00:05:44.957479 systemd[1]: Mounted boot.mount. Sep 13 00:05:44.969653 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:05:45.000702 kernel: loop1: detected capacity change from 0 to 207008 Sep 13 00:05:45.001489 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:05:45.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.024073 (sd-sysext)[1676]: Using extensions 'kubernetes'. Sep 13 00:05:45.026370 (sd-sysext)[1676]: Merged extensions into '/usr'. Sep 13 00:05:45.067697 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:05:45.069597 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:05:45.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.075354 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:05:45.080125 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.083208 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:05:45.089999 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:05:45.096324 systemd[1]: Starting modprobe@loop.service... Sep 13 00:05:45.103054 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.103638 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:05:45.109863 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:05:45.112951 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:05:45.113653 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:05:45.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.117169 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:05:45.117771 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:05:45.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.121126 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:05:45.121564 systemd[1]: Finished modprobe@loop.service. Sep 13 00:05:45.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.127047 systemd[1]: Finished systemd-sysext.service. Sep 13 00:05:45.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.133365 systemd[1]: Starting ensure-sysext.service... Sep 13 00:05:45.138461 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:05:45.138940 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.141438 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:05:45.150894 systemd[1]: Reloading. Sep 13 00:05:45.172544 systemd-tmpfiles[1683]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:05:45.190295 systemd-tmpfiles[1683]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:05:45.203550 systemd-tmpfiles[1683]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:05:45.270866 /usr/lib/systemd/system-generators/torcx-generator[1703]: time="2025-09-13T00:05:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:05:45.270930 /usr/lib/systemd/system-generators/torcx-generator[1703]: time="2025-09-13T00:05:45Z" level=info msg="torcx already run" Sep 13 00:05:45.501924 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:05:45.502204 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:05:45.550863 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:05:45.696000 audit: BPF prog-id=24 op=LOAD Sep 13 00:05:45.696000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:05:45.696000 audit: BPF prog-id=25 op=LOAD Sep 13 00:05:45.696000 audit: BPF prog-id=26 op=LOAD Sep 13 00:05:45.696000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:05:45.697000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:05:45.698000 audit: BPF prog-id=27 op=LOAD Sep 13 00:05:45.698000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:05:45.698000 audit: BPF prog-id=28 op=LOAD Sep 13 00:05:45.698000 audit: BPF prog-id=29 op=LOAD Sep 13 00:05:45.698000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:05:45.699000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:05:45.701000 audit: BPF prog-id=30 op=LOAD Sep 13 00:05:45.701000 audit: BPF prog-id=31 op=LOAD Sep 13 00:05:45.701000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:05:45.701000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:05:45.706000 audit: BPF prog-id=32 op=LOAD Sep 13 00:05:45.706000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:05:45.733359 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:05:45.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.745144 systemd[1]: Starting audit-rules.service... Sep 13 00:05:45.750353 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:05:45.756786 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:05:45.762000 audit: BPF prog-id=33 op=LOAD Sep 13 00:05:45.772000 audit: BPF prog-id=34 op=LOAD Sep 13 00:05:45.768846 systemd[1]: Starting systemd-resolved.service... Sep 13 00:05:45.777731 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:05:45.784659 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:05:45.792937 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:05:45.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.805018 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.807719 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:05:45.813148 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:05:45.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.818987 systemd[1]: Starting modprobe@loop.service... Sep 13 00:05:45.822621 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.822974 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:05:45.823255 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:05:45.826013 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:05:45.826392 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:05:45.832025 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.835917 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:05:45.838870 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.839243 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:05:45.839504 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:05:45.847539 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.855257 systemd[1]: Starting modprobe@drm.service... Sep 13 00:05:45.858662 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.859083 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:05:45.859470 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:05:45.861742 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:05:45.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.880000 audit[1765]: SYSTEM_BOOT pid=1765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.862156 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:05:45.865529 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:05:45.865942 systemd[1]: Finished modprobe@loop.service. Sep 13 00:05:45.871672 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:05:45.874480 systemd[1]: Finished ensure-sysext.service. Sep 13 00:05:45.886229 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:05:45.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.892659 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:05:45.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.893022 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:05:45.898619 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:05:45.900273 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:05:45.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:45.900560 systemd[1]: Finished modprobe@drm.service. Sep 13 00:05:45.936309 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:05:45.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:46.013530 systemd-resolved[1762]: Positive Trust Anchors: Sep 13 00:05:46.014217 systemd-resolved[1762]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:05:46.014405 systemd-resolved[1762]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:05:46.016000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:05:46.016000 audit[1784]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc25dc060 a2=420 a3=0 items=0 ppid=1759 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:46.016000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:05:46.019065 augenrules[1784]: No rules Sep 13 00:05:46.020933 systemd[1]: Finished audit-rules.service. Sep 13 00:05:46.070025 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:05:46.072426 systemd[1]: Reached target time-set.target. Sep 13 00:05:46.078933 systemd-resolved[1762]: Defaulting to hostname 'linux'. Sep 13 00:05:46.083271 systemd[1]: Started systemd-resolved.service. Sep 13 00:05:46.085377 systemd[1]: Reached target network.target. Sep 13 00:05:46.087549 systemd[1]: Reached target nss-lookup.target. Sep 13 00:05:46.143922 ldconfig[1650]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:05:46.156039 systemd[1]: Finished ldconfig.service. Sep 13 00:05:46.160596 systemd[1]: Starting systemd-update-done.service... Sep 13 00:05:46.175963 systemd[1]: Finished systemd-update-done.service. Sep 13 00:05:46.178546 systemd[1]: Reached target sysinit.target. Sep 13 00:05:46.182850 systemd[1]: Started motdgen.path. Sep 13 00:05:46.184812 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:05:46.187914 systemd[1]: Started logrotate.timer. Sep 13 00:05:46.190006 systemd[1]: Started mdadm.timer. Sep 13 00:05:46.191753 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:05:46.193873 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:05:46.193955 systemd[1]: Reached target paths.target. Sep 13 00:05:46.195951 systemd[1]: Reached target timers.target. Sep 13 00:05:46.198462 systemd[1]: Listening on dbus.socket. Sep 13 00:05:46.202688 systemd[1]: Starting docker.socket... Sep 13 00:05:46.210648 systemd[1]: Listening on sshd.socket. Sep 13 00:05:46.212718 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:05:46.213728 systemd[1]: Listening on docker.socket. Sep 13 00:05:46.215982 systemd[1]: Reached target sockets.target. Sep 13 00:05:46.218016 systemd[1]: Reached target basic.target. Sep 13 00:05:46.219966 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:05:46.220045 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:05:46.222457 systemd[1]: Starting containerd.service... Sep 13 00:05:46.227790 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 13 00:05:46.233357 systemd[1]: Starting dbus.service... Sep 13 00:05:46.238097 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:05:46.246118 systemd[1]: Starting extend-filesystems.service... Sep 13 00:05:46.248182 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:05:46.251173 systemd[1]: Starting motdgen.service... Sep 13 00:05:46.255421 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:05:46.266141 systemd[1]: Starting sshd-keygen.service... Sep 13 00:05:46.272837 systemd-networkd[1534]: eth0: Gained IPv6LL Sep 13 00:05:46.274492 systemd[1]: Starting systemd-logind.service... Sep 13 00:05:46.276330 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:05:46.276491 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:05:46.277550 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:05:46.279559 systemd[1]: Starting update-engine.service... Sep 13 00:05:46.286034 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:05:46.296644 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:05:46.316678 jq[1803]: true Sep 13 00:05:46.302739 systemd[1]: Reached target network-online.target. Sep 13 00:05:46.383735 jq[1796]: false Sep 13 00:05:46.307588 systemd[1]: Started amazon-ssm-agent.service. Sep 13 00:05:46.313556 systemd[1]: Starting kubelet.service... Sep 13 00:05:46.318703 systemd[1]: Started nvidia.service. Sep 13 00:05:46.333485 systemd-timesyncd[1764]: Contacted time server 51.81.20.74:123 (0.flatcar.pool.ntp.org). Sep 13 00:05:46.333682 systemd-timesyncd[1764]: Initial clock synchronization to Sat 2025-09-13 00:05:45.965694 UTC. Sep 13 00:05:46.340083 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:05:46.340597 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:05:46.398858 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:05:46.399273 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:05:46.473240 jq[1808]: true Sep 13 00:05:46.526106 dbus-daemon[1795]: [system] SELinux support is enabled Sep 13 00:05:46.531019 systemd[1]: Started dbus.service. Sep 13 00:05:46.536231 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:05:46.536303 systemd[1]: Reached target system-config.target. Sep 13 00:05:46.538525 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:05:46.538594 systemd[1]: Reached target user-config.target. Sep 13 00:05:46.560158 dbus-daemon[1795]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1534 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 13 00:05:46.575618 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:05:46.575991 systemd[1]: Finished motdgen.service. Sep 13 00:05:46.584474 systemd[1]: Starting systemd-hostnamed.service... Sep 13 00:05:46.599136 extend-filesystems[1797]: Found loop1 Sep 13 00:05:46.601601 extend-filesystems[1797]: Found nvme0n1 Sep 13 00:05:46.601601 extend-filesystems[1797]: Found nvme0n1p1 Sep 13 00:05:46.601601 extend-filesystems[1797]: Found nvme0n1p2 Sep 13 00:05:46.601601 extend-filesystems[1797]: Found nvme0n1p3 Sep 13 00:05:46.613260 extend-filesystems[1797]: Found usr Sep 13 00:05:46.613260 extend-filesystems[1797]: Found nvme0n1p4 Sep 13 00:05:46.613260 extend-filesystems[1797]: Found nvme0n1p6 Sep 13 00:05:46.613260 extend-filesystems[1797]: Found nvme0n1p7 Sep 13 00:05:46.613260 extend-filesystems[1797]: Found nvme0n1p9 Sep 13 00:05:46.613260 extend-filesystems[1797]: Checking size of /dev/nvme0n1p9 Sep 13 00:05:46.671931 bash[1850]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:05:46.673309 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:05:46.682121 update_engine[1802]: I0913 00:05:46.681447 1802 main.cc:92] Flatcar Update Engine starting Sep 13 00:05:46.690207 systemd[1]: Started update-engine.service. Sep 13 00:05:46.692942 update_engine[1802]: I0913 00:05:46.692799 1802 update_check_scheduler.cc:74] Next update check in 6m26s Sep 13 00:05:46.697280 systemd[1]: Started locksmithd.service. Sep 13 00:05:46.717794 extend-filesystems[1797]: Resized partition /dev/nvme0n1p9 Sep 13 00:05:46.760102 extend-filesystems[1856]: resize2fs 1.46.5 (30-Dec-2021) Sep 13 00:05:46.780720 env[1812]: time="2025-09-13T00:05:46.780515701Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:05:46.793616 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Sep 13 00:05:46.881621 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Sep 13 00:05:46.905936 extend-filesystems[1856]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Sep 13 00:05:46.905936 extend-filesystems[1856]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 13 00:05:46.905936 extend-filesystems[1856]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Sep 13 00:05:46.914211 extend-filesystems[1797]: Resized filesystem in /dev/nvme0n1p9 Sep 13 00:05:46.918596 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:05:46.918980 systemd[1]: Finished extend-filesystems.service. Sep 13 00:05:46.924222 systemd-logind[1801]: Watching system buttons on /dev/input/event0 (Power Button) Sep 13 00:05:46.924278 systemd-logind[1801]: Watching system buttons on /dev/input/event1 (Sleep Button) Sep 13 00:05:46.929745 systemd-logind[1801]: New seat seat0. Sep 13 00:05:46.936603 systemd[1]: Started systemd-logind.service. Sep 13 00:05:46.947112 amazon-ssm-agent[1805]: 2025/09/13 00:05:46 Failed to load instance info from vault. RegistrationKey does not exist. Sep 13 00:05:46.956608 env[1812]: time="2025-09-13T00:05:46.953053658Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:05:46.956608 env[1812]: time="2025-09-13T00:05:46.953495786Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:05:46.956608 env[1812]: time="2025-09-13T00:05:46.955857554Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:05:46.956608 env[1812]: time="2025-09-13T00:05:46.955913294Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:05:46.969507 env[1812]: time="2025-09-13T00:05:46.969408758Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:05:46.969507 env[1812]: time="2025-09-13T00:05:46.969482522Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:05:46.969722 env[1812]: time="2025-09-13T00:05:46.969520754Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:05:46.969722 env[1812]: time="2025-09-13T00:05:46.969546398Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:05:46.969850 env[1812]: time="2025-09-13T00:05:46.969814958Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:05:46.970585 env[1812]: time="2025-09-13T00:05:46.970439750Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:05:46.970796 env[1812]: time="2025-09-13T00:05:46.970742978Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:05:46.970877 env[1812]: time="2025-09-13T00:05:46.970792406Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:05:46.970934 env[1812]: time="2025-09-13T00:05:46.970913186Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:05:46.971005 env[1812]: time="2025-09-13T00:05:46.970938890Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:05:46.980679 env[1812]: time="2025-09-13T00:05:46.980603990Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:05:46.980816 env[1812]: time="2025-09-13T00:05:46.980694950Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:05:46.980816 env[1812]: time="2025-09-13T00:05:46.980770394Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:05:46.980926 env[1812]: time="2025-09-13T00:05:46.980853086Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981051 env[1812]: time="2025-09-13T00:05:46.981005186Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981117 env[1812]: time="2025-09-13T00:05:46.981057890Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981117 env[1812]: time="2025-09-13T00:05:46.981092054Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981673 env[1812]: time="2025-09-13T00:05:46.981625658Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981749 env[1812]: time="2025-09-13T00:05:46.981678986Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981805 env[1812]: time="2025-09-13T00:05:46.981739430Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981805 env[1812]: time="2025-09-13T00:05:46.981774926Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.981938 env[1812]: time="2025-09-13T00:05:46.981808646Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:05:46.982075 env[1812]: time="2025-09-13T00:05:46.982030142Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:05:46.982294 env[1812]: time="2025-09-13T00:05:46.982250690Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:05:46.982932 env[1812]: time="2025-09-13T00:05:46.982876466Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:05:46.983034 env[1812]: time="2025-09-13T00:05:46.982946342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983034 env[1812]: time="2025-09-13T00:05:46.982985018Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:05:46.983272 env[1812]: time="2025-09-13T00:05:46.983229770Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983400 env[1812]: time="2025-09-13T00:05:46.983360534Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983464 env[1812]: time="2025-09-13T00:05:46.983405858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983464 env[1812]: time="2025-09-13T00:05:46.983441006Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983563 env[1812]: time="2025-09-13T00:05:46.983471342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983563 env[1812]: time="2025-09-13T00:05:46.983503250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983563 env[1812]: time="2025-09-13T00:05:46.983533778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983749 env[1812]: time="2025-09-13T00:05:46.983563454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.983749 env[1812]: time="2025-09-13T00:05:46.983616974Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:05:46.983944 env[1812]: time="2025-09-13T00:05:46.983900522Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.984019 env[1812]: time="2025-09-13T00:05:46.983957798Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.984019 env[1812]: time="2025-09-13T00:05:46.983990414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.984118 env[1812]: time="2025-09-13T00:05:46.984019214Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:05:46.984118 env[1812]: time="2025-09-13T00:05:46.984051878Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:05:46.984118 env[1812]: time="2025-09-13T00:05:46.984080006Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:05:46.984276 env[1812]: time="2025-09-13T00:05:46.984113894Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:05:46.984276 env[1812]: time="2025-09-13T00:05:46.984194486Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:05:46.984647 env[1812]: time="2025-09-13T00:05:46.984518318Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:05:46.986509 env[1812]: time="2025-09-13T00:05:46.984651002Z" level=info msg="Connect containerd service" Sep 13 00:05:46.986509 env[1812]: time="2025-09-13T00:05:46.984713126Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:05:46.986509 env[1812]: time="2025-09-13T00:05:46.986003930Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:05:46.986751 env[1812]: time="2025-09-13T00:05:46.986660654Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:05:46.986810 env[1812]: time="2025-09-13T00:05:46.986757986Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:05:46.986957 systemd[1]: Started containerd.service. Sep 13 00:05:46.991351 env[1812]: time="2025-09-13T00:05:46.991239614Z" level=info msg="Start subscribing containerd event" Sep 13 00:05:46.991516 env[1812]: time="2025-09-13T00:05:46.991383362Z" level=info msg="Start recovering state" Sep 13 00:05:46.991516 env[1812]: time="2025-09-13T00:05:46.991505630Z" level=info msg="Start event monitor" Sep 13 00:05:46.991675 env[1812]: time="2025-09-13T00:05:46.991542914Z" level=info msg="Start snapshots syncer" Sep 13 00:05:46.991675 env[1812]: time="2025-09-13T00:05:46.991593914Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:05:46.991675 env[1812]: time="2025-09-13T00:05:46.991634174Z" level=info msg="Start streaming server" Sep 13 00:05:47.003907 env[1812]: time="2025-09-13T00:05:47.003728976Z" level=info msg="containerd successfully booted in 0.224932s" Sep 13 00:05:47.020357 amazon-ssm-agent[1805]: Initializing new seelog logger Sep 13 00:05:47.022298 amazon-ssm-agent[1805]: New Seelog Logger Creation Complete Sep 13 00:05:47.028743 amazon-ssm-agent[1805]: 2025/09/13 00:05:47 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:05:47.029023 amazon-ssm-agent[1805]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:05:47.033150 amazon-ssm-agent[1805]: 2025/09/13 00:05:47 processing appconfig overrides Sep 13 00:05:47.044321 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:05:47.214764 dbus-daemon[1795]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 13 00:05:47.215020 systemd[1]: Started systemd-hostnamed.service. Sep 13 00:05:47.218022 dbus-daemon[1795]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1842 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 13 00:05:47.223075 systemd[1]: Starting polkit.service... Sep 13 00:05:47.265455 polkitd[1940]: Started polkitd version 121 Sep 13 00:05:47.334729 polkitd[1940]: Loading rules from directory /etc/polkit-1/rules.d Sep 13 00:05:47.335066 polkitd[1940]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 13 00:05:47.345331 polkitd[1940]: Finished loading, compiling and executing 2 rules Sep 13 00:05:47.348174 dbus-daemon[1795]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 13 00:05:47.349024 polkitd[1940]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 13 00:05:47.351558 systemd[1]: Started polkit.service. Sep 13 00:05:47.438605 systemd-resolved[1762]: System hostname changed to 'ip-172-31-31-136'. Sep 13 00:05:47.438614 systemd-hostnamed[1842]: Hostname set to (transient) Sep 13 00:05:47.525134 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Create new startup processor Sep 13 00:05:47.533306 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [LongRunningPluginsManager] registered plugins: {} Sep 13 00:05:47.533306 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing bookkeeping folders Sep 13 00:05:47.533484 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO removing the completed state files Sep 13 00:05:47.533484 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing bookkeeping folders for long running plugins Sep 13 00:05:47.533484 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Sep 13 00:05:47.533484 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing healthcheck folders for long running plugins Sep 13 00:05:47.533484 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing locations for inventory plugin Sep 13 00:05:47.533484 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing default location for custom inventory Sep 13 00:05:47.533484 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing default location for file inventory Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Initializing default location for role inventory Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Init the cloudwatchlogs publisher Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:softwareInventory Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:downloadContent Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:runPowerShellScript Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:updateSsmAgent Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:configureDocker Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:runDockerAction Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:refreshAssociation Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:configurePackage Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform independent plugin aws:runDocument Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Successfully loaded platform dependent plugin aws:runShellScript Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Sep 13 00:05:47.533856 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO OS: linux, Arch: arm64 Sep 13 00:05:47.554513 amazon-ssm-agent[1805]: datastore file /var/lib/amazon/ssm/i-0323e67d641a7467b/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Sep 13 00:05:47.610968 coreos-metadata[1794]: Sep 13 00:05:47.610 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 13 00:05:47.617608 coreos-metadata[1794]: Sep 13 00:05:47.616 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Sep 13 00:05:47.618094 coreos-metadata[1794]: Sep 13 00:05:47.617 INFO Fetch successful Sep 13 00:05:47.618094 coreos-metadata[1794]: Sep 13 00:05:47.618 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 13 00:05:47.621174 coreos-metadata[1794]: Sep 13 00:05:47.620 INFO Fetch successful Sep 13 00:05:47.625472 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] Starting session document processing engine... Sep 13 00:05:47.626847 unknown[1794]: wrote ssh authorized keys file for user: core Sep 13 00:05:47.654545 update-ssh-keys[1980]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:05:47.657326 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 13 00:05:47.720398 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] [EngineProcessor] Starting Sep 13 00:05:47.814679 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Sep 13 00:05:47.873667 locksmithd[1854]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:05:47.909191 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0323e67d641a7467b, requestId: d2565e3a-48f8-47c6-b0e4-23d12cb4e75c Sep 13 00:05:48.003915 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] Starting document processing engine... Sep 13 00:05:48.098837 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] [EngineProcessor] Starting Sep 13 00:05:48.193939 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Sep 13 00:05:48.289231 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] Starting message polling Sep 13 00:05:48.384723 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] Starting send replies to MDS Sep 13 00:05:48.480466 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [instanceID=i-0323e67d641a7467b] Starting association polling Sep 13 00:05:48.576284 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Sep 13 00:05:48.672359 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] [Association] Launching response handler Sep 13 00:05:48.768721 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Sep 13 00:05:48.865131 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Sep 13 00:05:48.961802 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Sep 13 00:05:49.058747 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] listening reply. Sep 13 00:05:49.155745 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [HealthCheck] HealthCheck reporting agent health. Sep 13 00:05:49.253030 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [OfflineService] Starting document processing engine... Sep 13 00:05:49.350519 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [OfflineService] [EngineProcessor] Starting Sep 13 00:05:49.448111 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [OfflineService] [EngineProcessor] Initial processing Sep 13 00:05:49.478825 sshd_keygen[1830]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:05:49.524774 systemd[1]: Finished sshd-keygen.service. Sep 13 00:05:49.529869 systemd[1]: Starting issuegen.service... Sep 13 00:05:49.533224 systemd[1]: Started kubelet.service. Sep 13 00:05:49.543937 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:05:49.544347 systemd[1]: Finished issuegen.service. Sep 13 00:05:49.546957 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [OfflineService] Starting message polling Sep 13 00:05:49.549458 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:05:49.565960 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:05:49.570944 systemd[1]: Started getty@tty1.service. Sep 13 00:05:49.576246 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:05:49.579197 systemd[1]: Reached target getty.target. Sep 13 00:05:49.581172 systemd[1]: Reached target multi-user.target. Sep 13 00:05:49.586093 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:05:49.604197 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:05:49.604565 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:05:49.606953 systemd[1]: Startup finished in 1.222s (kernel) + 8.014s (initrd) + 11.991s (userspace) = 21.228s. Sep 13 00:05:49.644286 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [OfflineService] Starting send replies to MDS Sep 13 00:05:49.742545 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [LongRunningPluginsManager] starting long running plugin manager Sep 13 00:05:49.841012 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Sep 13 00:05:49.939651 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Sep 13 00:05:50.038555 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [StartupProcessor] Executing startup processor tasks Sep 13 00:05:50.137714 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Sep 13 00:05:50.237007 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Sep 13 00:05:50.336476 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Sep 13 00:05:50.436073 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0323e67d641a7467b?role=subscribe&stream=input Sep 13 00:05:50.536049 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0323e67d641a7467b?role=subscribe&stream=input Sep 13 00:05:50.636027 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] Starting receiving message from control channel Sep 13 00:05:50.736291 amazon-ssm-agent[1805]: 2025-09-13 00:05:47 INFO [MessageGatewayService] [EngineProcessor] Initial processing Sep 13 00:05:50.813753 kubelet[1995]: E0913 00:05:50.813590 1995 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:05:50.817492 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:05:50.817837 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:05:50.818282 systemd[1]: kubelet.service: Consumed 1.603s CPU time. Sep 13 00:05:51.061367 amazon-ssm-agent[1805]: 2025-09-13 00:05:51 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Sep 13 00:05:54.639272 systemd[1]: Created slice system-sshd.slice. Sep 13 00:05:54.641698 systemd[1]: Started sshd@0-172.31.31.136:22-139.178.89.65:45244.service. Sep 13 00:05:54.983720 sshd[2007]: Accepted publickey for core from 139.178.89.65 port 45244 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:05:54.988904 sshd[2007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:55.010432 systemd[1]: Created slice user-500.slice. Sep 13 00:05:55.013063 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:05:55.018522 systemd-logind[1801]: New session 1 of user core. Sep 13 00:05:55.034443 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:05:55.037506 systemd[1]: Starting user@500.service... Sep 13 00:05:55.046210 (systemd)[2010]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:55.236722 systemd[2010]: Queued start job for default target default.target. Sep 13 00:05:55.237788 systemd[2010]: Reached target paths.target. Sep 13 00:05:55.237841 systemd[2010]: Reached target sockets.target. Sep 13 00:05:55.237873 systemd[2010]: Reached target timers.target. Sep 13 00:05:55.237902 systemd[2010]: Reached target basic.target. Sep 13 00:05:55.237996 systemd[2010]: Reached target default.target. Sep 13 00:05:55.238060 systemd[2010]: Startup finished in 179ms. Sep 13 00:05:55.238649 systemd[1]: Started user@500.service. Sep 13 00:05:55.240691 systemd[1]: Started session-1.scope. Sep 13 00:05:55.389261 systemd[1]: Started sshd@1-172.31.31.136:22-139.178.89.65:45256.service. Sep 13 00:05:55.571529 sshd[2019]: Accepted publickey for core from 139.178.89.65 port 45256 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:05:55.573999 sshd[2019]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:55.582664 systemd-logind[1801]: New session 2 of user core. Sep 13 00:05:55.583114 systemd[1]: Started session-2.scope. Sep 13 00:05:55.715511 sshd[2019]: pam_unix(sshd:session): session closed for user core Sep 13 00:05:55.721155 systemd[1]: sshd@1-172.31.31.136:22-139.178.89.65:45256.service: Deactivated successfully. Sep 13 00:05:55.722381 systemd[1]: session-2.scope: Deactivated successfully. Sep 13 00:05:55.722720 systemd-logind[1801]: Session 2 logged out. Waiting for processes to exit. Sep 13 00:05:55.724213 systemd-logind[1801]: Removed session 2. Sep 13 00:05:55.742351 systemd[1]: Started sshd@2-172.31.31.136:22-139.178.89.65:45270.service. Sep 13 00:05:55.916929 sshd[2026]: Accepted publickey for core from 139.178.89.65 port 45270 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:05:55.920056 sshd[2026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:55.928027 systemd-logind[1801]: New session 3 of user core. Sep 13 00:05:55.928857 systemd[1]: Started session-3.scope. Sep 13 00:05:56.049055 sshd[2026]: pam_unix(sshd:session): session closed for user core Sep 13 00:05:56.053900 systemd[1]: sshd@2-172.31.31.136:22-139.178.89.65:45270.service: Deactivated successfully. Sep 13 00:05:56.055114 systemd[1]: session-3.scope: Deactivated successfully. Sep 13 00:05:56.056326 systemd-logind[1801]: Session 3 logged out. Waiting for processes to exit. Sep 13 00:05:56.058030 systemd-logind[1801]: Removed session 3. Sep 13 00:05:56.076212 systemd[1]: Started sshd@3-172.31.31.136:22-139.178.89.65:45278.service. Sep 13 00:05:56.248944 sshd[2032]: Accepted publickey for core from 139.178.89.65 port 45278 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:05:56.251440 sshd[2032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:56.259361 systemd-logind[1801]: New session 4 of user core. Sep 13 00:05:56.260252 systemd[1]: Started session-4.scope. Sep 13 00:05:56.388434 sshd[2032]: pam_unix(sshd:session): session closed for user core Sep 13 00:05:56.393702 systemd-logind[1801]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:05:56.394265 systemd[1]: sshd@3-172.31.31.136:22-139.178.89.65:45278.service: Deactivated successfully. Sep 13 00:05:56.395456 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:05:56.396996 systemd-logind[1801]: Removed session 4. Sep 13 00:05:56.418270 systemd[1]: Started sshd@4-172.31.31.136:22-139.178.89.65:45280.service. Sep 13 00:05:56.592339 sshd[2038]: Accepted publickey for core from 139.178.89.65 port 45280 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:05:56.595421 sshd[2038]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:56.603372 systemd-logind[1801]: New session 5 of user core. Sep 13 00:05:56.604242 systemd[1]: Started session-5.scope. Sep 13 00:05:56.758487 sudo[2041]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:05:56.759538 sudo[2041]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:05:56.781865 dbus-daemon[1795]: avc: received setenforce notice (enforcing=1) Sep 13 00:05:56.784613 sudo[2041]: pam_unix(sudo:session): session closed for user root Sep 13 00:05:56.810179 sshd[2038]: pam_unix(sshd:session): session closed for user core Sep 13 00:05:56.815317 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:05:56.816857 systemd[1]: sshd@4-172.31.31.136:22-139.178.89.65:45280.service: Deactivated successfully. Sep 13 00:05:56.817083 systemd-logind[1801]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:05:56.819630 systemd-logind[1801]: Removed session 5. Sep 13 00:05:56.838869 systemd[1]: Started sshd@5-172.31.31.136:22-139.178.89.65:45292.service. Sep 13 00:05:57.017397 sshd[2045]: Accepted publickey for core from 139.178.89.65 port 45292 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:05:57.020552 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:57.028876 systemd[1]: Started session-6.scope. Sep 13 00:05:57.030665 systemd-logind[1801]: New session 6 of user core. Sep 13 00:05:57.137066 sudo[2049]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:05:57.137702 sudo[2049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:05:57.143100 sudo[2049]: pam_unix(sudo:session): session closed for user root Sep 13 00:05:57.152510 sudo[2048]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:05:57.153666 sudo[2048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:05:57.171493 systemd[1]: Stopping audit-rules.service... Sep 13 00:05:57.171000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:05:57.174105 auditctl[2052]: No rules Sep 13 00:05:57.175594 kernel: kauditd_printk_skb: 102 callbacks suppressed Sep 13 00:05:57.175658 kernel: audit: type=1305 audit(1757721957.171:197): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:05:57.176214 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:05:57.176597 systemd[1]: Stopped audit-rules.service. Sep 13 00:05:57.171000 audit[2052]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe006fc60 a2=420 a3=0 items=0 ppid=1 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:57.179832 systemd[1]: Starting audit-rules.service... Sep 13 00:05:57.192398 kernel: audit: type=1300 audit(1757721957.171:197): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe006fc60 a2=420 a3=0 items=0 ppid=1 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:57.171000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:05:57.196713 kernel: audit: type=1327 audit(1757721957.171:197): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:05:57.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.204733 kernel: audit: type=1131 audit(1757721957.175:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.221070 augenrules[2069]: No rules Sep 13 00:05:57.222672 systemd[1]: Finished audit-rules.service. Sep 13 00:05:57.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.231551 sudo[2048]: pam_unix(sudo:session): session closed for user root Sep 13 00:05:57.231000 audit[2048]: USER_END pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.241582 kernel: audit: type=1130 audit(1757721957.222:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.241702 kernel: audit: type=1106 audit(1757721957.231:200): pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.231000 audit[2048]: CRED_DISP pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.249735 kernel: audit: type=1104 audit(1757721957.231:201): pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.255180 sshd[2045]: pam_unix(sshd:session): session closed for user core Sep 13 00:05:57.255000 audit[2045]: USER_END pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.259758 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:05:57.261368 systemd[1]: sshd@5-172.31.31.136:22-139.178.89.65:45292.service: Deactivated successfully. Sep 13 00:05:57.255000 audit[2045]: CRED_DISP pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.277794 kernel: audit: type=1106 audit(1757721957.255:202): pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.277903 kernel: audit: type=1104 audit(1757721957.255:203): pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.277414 systemd-logind[1801]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:05:57.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.136:22-139.178.89.65:45292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.287951 kernel: audit: type=1131 audit(1757721957.260:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.136:22-139.178.89.65:45292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.136:22-139.178.89.65:45306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.287096 systemd[1]: Started sshd@6-172.31.31.136:22-139.178.89.65:45306.service. Sep 13 00:05:57.289370 systemd-logind[1801]: Removed session 6. Sep 13 00:05:57.463000 audit[2075]: USER_ACCT pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.464781 sshd[2075]: Accepted publickey for core from 139.178.89.65 port 45306 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:05:57.465000 audit[2075]: CRED_ACQ pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.466000 audit[2075]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe941d270 a2=3 a3=1 items=0 ppid=1 pid=2075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:57.466000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:05:57.467776 sshd[2075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:05:57.476435 systemd[1]: Started session-7.scope. Sep 13 00:05:57.477513 systemd-logind[1801]: New session 7 of user core. Sep 13 00:05:57.484000 audit[2075]: USER_START pid=2075 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.487000 audit[2077]: CRED_ACQ pid=2077 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:57.581000 audit[2078]: USER_ACCT pid=2078 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.584664 sudo[2078]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:05:57.583000 audit[2078]: CRED_REFR pid=2078 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.585828 sudo[2078]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:05:57.587000 audit[2078]: USER_START pid=2078 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:57.609888 systemd[1]: Starting coreos-metadata.service... Sep 13 00:05:57.773488 coreos-metadata[2082]: Sep 13 00:05:57.773 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 13 00:05:57.774804 coreos-metadata[2082]: Sep 13 00:05:57.774 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Sep 13 00:05:57.775870 coreos-metadata[2082]: Sep 13 00:05:57.775 INFO Fetch successful Sep 13 00:05:57.776135 coreos-metadata[2082]: Sep 13 00:05:57.775 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Sep 13 00:05:57.776712 coreos-metadata[2082]: Sep 13 00:05:57.776 INFO Fetch successful Sep 13 00:05:57.776971 coreos-metadata[2082]: Sep 13 00:05:57.776 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Sep 13 00:05:57.777527 coreos-metadata[2082]: Sep 13 00:05:57.777 INFO Fetch successful Sep 13 00:05:57.777845 coreos-metadata[2082]: Sep 13 00:05:57.777 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Sep 13 00:05:57.778372 coreos-metadata[2082]: Sep 13 00:05:57.778 INFO Fetch successful Sep 13 00:05:57.778680 coreos-metadata[2082]: Sep 13 00:05:57.778 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Sep 13 00:05:57.779208 coreos-metadata[2082]: Sep 13 00:05:57.779 INFO Fetch successful Sep 13 00:05:57.779489 coreos-metadata[2082]: Sep 13 00:05:57.779 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Sep 13 00:05:57.780045 coreos-metadata[2082]: Sep 13 00:05:57.779 INFO Fetch successful Sep 13 00:05:57.780298 coreos-metadata[2082]: Sep 13 00:05:57.780 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Sep 13 00:05:57.780909 coreos-metadata[2082]: Sep 13 00:05:57.780 INFO Fetch successful Sep 13 00:05:57.781162 coreos-metadata[2082]: Sep 13 00:05:57.780 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Sep 13 00:05:57.781763 coreos-metadata[2082]: Sep 13 00:05:57.781 INFO Fetch successful Sep 13 00:05:57.794786 systemd[1]: Finished coreos-metadata.service. Sep 13 00:05:57.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:59.066524 systemd[1]: Stopped kubelet.service. Sep 13 00:05:59.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:59.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:59.067070 systemd[1]: kubelet.service: Consumed 1.603s CPU time. Sep 13 00:05:59.071208 systemd[1]: Starting kubelet.service... Sep 13 00:05:59.119344 systemd[1]: Reloading. Sep 13 00:05:59.330960 /usr/lib/systemd/system-generators/torcx-generator[2139]: time="2025-09-13T00:05:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:05:59.331028 /usr/lib/systemd/system-generators/torcx-generator[2139]: time="2025-09-13T00:05:59Z" level=info msg="torcx already run" Sep 13 00:05:59.519938 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:05:59.519983 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:05:59.559057 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit: BPF prog-id=43 op=LOAD Sep 13 00:05:59.720000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit: BPF prog-id=44 op=LOAD Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit: BPF prog-id=45 op=LOAD Sep 13 00:05:59.721000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:05:59.721000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit: BPF prog-id=46 op=LOAD Sep 13 00:05:59.722000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit: BPF prog-id=47 op=LOAD Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.722000 audit: BPF prog-id=48 op=LOAD Sep 13 00:05:59.723000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:05:59.723000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit: BPF prog-id=49 op=LOAD Sep 13 00:05:59.725000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit: BPF prog-id=50 op=LOAD Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.726000 audit: BPF prog-id=51 op=LOAD Sep 13 00:05:59.726000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:05:59.726000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:05:59.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit: BPF prog-id=52 op=LOAD Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.728000 audit: BPF prog-id=53 op=LOAD Sep 13 00:05:59.728000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:05:59.728000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.732000 audit: BPF prog-id=54 op=LOAD Sep 13 00:05:59.732000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.736000 audit: BPF prog-id=55 op=LOAD Sep 13 00:05:59.736000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit: BPF prog-id=56 op=LOAD Sep 13 00:05:59.741000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit: BPF prog-id=57 op=LOAD Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.742000 audit: BPF prog-id=58 op=LOAD Sep 13 00:05:59.742000 audit: BPF prog-id=39 op=UNLOAD Sep 13 00:05:59.742000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.745000 audit: BPF prog-id=59 op=LOAD Sep 13 00:05:59.745000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:59.748000 audit: BPF prog-id=60 op=LOAD Sep 13 00:05:59.748000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:05:59.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:59.790181 systemd[1]: Started kubelet.service. Sep 13 00:05:59.806698 systemd[1]: Stopping kubelet.service... Sep 13 00:05:59.809040 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:05:59.809403 systemd[1]: Stopped kubelet.service. Sep 13 00:05:59.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:59.812688 systemd[1]: Starting kubelet.service... Sep 13 00:06:00.156463 systemd[1]: Started kubelet.service. Sep 13 00:06:00.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:00.246007 kubelet[2203]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:06:00.246542 kubelet[2203]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:06:00.246542 kubelet[2203]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:06:00.246542 kubelet[2203]: I0913 00:06:00.246155 2203 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:06:01.290472 kubelet[2203]: I0913 00:06:01.290384 2203 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 13 00:06:01.290472 kubelet[2203]: I0913 00:06:01.290445 2203 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:06:01.291275 kubelet[2203]: I0913 00:06:01.290954 2203 server.go:954] "Client rotation is on, will bootstrap in background" Sep 13 00:06:01.412587 kubelet[2203]: I0913 00:06:01.412447 2203 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:06:01.430914 kubelet[2203]: E0913 00:06:01.430813 2203 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:06:01.430914 kubelet[2203]: I0913 00:06:01.430913 2203 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:06:01.439785 kubelet[2203]: I0913 00:06:01.439732 2203 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:06:01.442988 kubelet[2203]: I0913 00:06:01.442898 2203 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:06:01.443603 kubelet[2203]: I0913 00:06:01.443220 2203 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.31.136","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:06:01.444158 kubelet[2203]: I0913 00:06:01.444116 2203 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:06:01.444374 kubelet[2203]: I0913 00:06:01.444346 2203 container_manager_linux.go:304] "Creating device plugin manager" Sep 13 00:06:01.444923 kubelet[2203]: I0913 00:06:01.444884 2203 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:06:01.452278 kubelet[2203]: I0913 00:06:01.452227 2203 kubelet.go:446] "Attempting to sync node with API server" Sep 13 00:06:01.452529 kubelet[2203]: I0913 00:06:01.452500 2203 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:06:01.452805 kubelet[2203]: I0913 00:06:01.452774 2203 kubelet.go:352] "Adding apiserver pod source" Sep 13 00:06:01.452979 kubelet[2203]: I0913 00:06:01.452942 2203 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:06:01.453586 kubelet[2203]: E0913 00:06:01.453492 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:01.453884 kubelet[2203]: E0913 00:06:01.453628 2203 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:01.459260 kubelet[2203]: I0913 00:06:01.459211 2203 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:06:01.460519 kubelet[2203]: I0913 00:06:01.460447 2203 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:06:01.460775 kubelet[2203]: W0913 00:06:01.460729 2203 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:06:01.462858 kubelet[2203]: I0913 00:06:01.462789 2203 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:06:01.463046 kubelet[2203]: I0913 00:06:01.462875 2203 server.go:1287] "Started kubelet" Sep 13 00:06:01.463973 kubelet[2203]: I0913 00:06:01.463837 2203 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:06:01.465141 kubelet[2203]: I0913 00:06:01.465095 2203 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:06:01.467000 audit[2203]: AVC avc: denied { mac_admin } for pid=2203 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:01.467000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:06:01.467000 audit[2203]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400074c510 a1=4000806258 a2=400074c4e0 a3=25 items=0 ppid=1 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.467000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:06:01.468743 kubelet[2203]: I0913 00:06:01.468676 2203 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:06:01.468000 audit[2203]: AVC avc: denied { mac_admin } for pid=2203 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:01.468000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:06:01.468000 audit[2203]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000f06c0 a1=4000806270 a2=400074c5a0 a3=25 items=0 ppid=1 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.468000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:06:01.469423 kubelet[2203]: I0913 00:06:01.469379 2203 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:06:01.469814 kubelet[2203]: I0913 00:06:01.469776 2203 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:06:01.478974 kubelet[2203]: E0913 00:06:01.478381 2203 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.136.1864aecfa6e52bca default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.136,UID:172.31.31.136,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.31.136,},FirstTimestamp:2025-09-13 00:06:01.46283617 +0000 UTC m=+1.295989736,LastTimestamp:2025-09-13 00:06:01.46283617 +0000 UTC m=+1.295989736,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.136,}" Sep 13 00:06:01.480328 kubelet[2203]: I0913 00:06:01.480236 2203 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:06:01.482238 kubelet[2203]: I0913 00:06:01.482188 2203 server.go:479] "Adding debug handlers to kubelet server" Sep 13 00:06:01.484144 kubelet[2203]: I0913 00:06:01.484095 2203 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:06:01.487509 kubelet[2203]: I0913 00:06:01.487426 2203 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:06:01.488137 kubelet[2203]: E0913 00:06:01.488054 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:01.494616 kubelet[2203]: I0913 00:06:01.490651 2203 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:06:01.494616 kubelet[2203]: I0913 00:06:01.490821 2203 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:06:01.507107 kubelet[2203]: I0913 00:06:01.506436 2203 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:06:01.509374 kubelet[2203]: E0913 00:06:01.508385 2203 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:06:01.510626 kubelet[2203]: I0913 00:06:01.510532 2203 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:06:01.510626 kubelet[2203]: I0913 00:06:01.510598 2203 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:06:01.523243 kubelet[2203]: W0913 00:06:01.523182 2203 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Sep 13 00:06:01.523599 kubelet[2203]: E0913 00:06:01.523502 2203 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 13 00:06:01.523893 kubelet[2203]: W0913 00:06:01.523862 2203 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.31.136" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 13 00:06:01.524210 kubelet[2203]: E0913 00:06:01.524166 2203 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.31.136\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 00:06:01.524441 kubelet[2203]: W0913 00:06:01.524414 2203 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 13 00:06:01.524679 kubelet[2203]: E0913 00:06:01.524620 2203 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 00:06:01.525223 kubelet[2203]: E0913 00:06:01.525153 2203 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.31.136\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 13 00:06:01.556069 kubelet[2203]: I0913 00:06:01.553657 2203 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:06:01.556069 kubelet[2203]: I0913 00:06:01.553764 2203 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:06:01.556069 kubelet[2203]: I0913 00:06:01.553814 2203 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:06:01.557919 kubelet[2203]: I0913 00:06:01.557874 2203 policy_none.go:49] "None policy: Start" Sep 13 00:06:01.558142 kubelet[2203]: I0913 00:06:01.558114 2203 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:06:01.558300 kubelet[2203]: I0913 00:06:01.558279 2203 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:06:01.560000 audit[2218]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.560000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe2197420 a2=0 a3=1 items=0 ppid=2203 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:06:01.562000 audit[2223]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.562000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffe55bf70 a2=0 a3=1 items=0 ppid=2203 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:06:01.569614 systemd[1]: Created slice kubepods.slice. Sep 13 00:06:01.581542 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:06:01.588537 kubelet[2203]: E0913 00:06:01.588457 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:01.595883 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:06:01.572000 audit[2225]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.572000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffff486870 a2=0 a3=1 items=0 ppid=2203 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:06:01.603000 audit[2203]: AVC avc: denied { mac_admin } for pid=2203 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:01.603000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:06:01.603000 audit[2203]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008ba000 a1=4000807758 a2=4000052d50 a3=25 items=0 ppid=1 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:06:01.605030 kubelet[2203]: I0913 00:06:01.604440 2203 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:06:01.605030 kubelet[2203]: I0913 00:06:01.604642 2203 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:06:01.605177 kubelet[2203]: I0913 00:06:01.604934 2203 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:06:01.607121 kubelet[2203]: I0913 00:06:01.605105 2203 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:06:01.607121 kubelet[2203]: I0913 00:06:01.605819 2203 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:06:01.608757 kubelet[2203]: E0913 00:06:01.608721 2203 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:06:01.609201 kubelet[2203]: E0913 00:06:01.609134 2203 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.136\" not found" Sep 13 00:06:01.608000 audit[2230]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.608000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff9a8b2b0 a2=0 a3=1 items=0 ppid=2203 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:06:01.709167 kubelet[2203]: I0913 00:06:01.707680 2203 kubelet_node_status.go:75] "Attempting to register node" node="172.31.31.136" Sep 13 00:06:01.722286 kubelet[2203]: I0913 00:06:01.722241 2203 kubelet_node_status.go:78] "Successfully registered node" node="172.31.31.136" Sep 13 00:06:01.722618 kubelet[2203]: E0913 00:06:01.722557 2203 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"172.31.31.136\": node \"172.31.31.136\" not found" Sep 13 00:06:01.727000 audit[2235]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.727000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff6145900 a2=0 a3=1 items=0 ppid=2203 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:06:01.729020 kubelet[2203]: I0913 00:06:01.728965 2203 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:06:01.731000 audit[2236]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:01.731000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd67e1ab0 a2=0 a3=1 items=0 ppid=2203 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:06:01.734565 kubelet[2203]: I0913 00:06:01.734516 2203 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:06:01.734911 kubelet[2203]: I0913 00:06:01.734859 2203 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 13 00:06:01.735428 kubelet[2203]: I0913 00:06:01.735374 2203 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:06:01.735755 kubelet[2203]: I0913 00:06:01.735707 2203 kubelet.go:2382] "Starting kubelet main sync loop" Sep 13 00:06:01.736123 kubelet[2203]: E0913 00:06:01.736082 2203 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 00:06:01.740000 audit[2237]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.740000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1db6590 a2=0 a3=1 items=0 ppid=2203 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:06:01.740000 audit[2238]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:01.740000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb664350 a2=0 a3=1 items=0 ppid=2203 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:06:01.743000 audit[2239]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:01.743000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc35e9fd0 a2=0 a3=1 items=0 ppid=2203 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:06:01.744000 audit[2240]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.744000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd8ecd0f0 a2=0 a3=1 items=0 ppid=2203 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:06:01.746000 audit[2241]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:01.746000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc18cea50 a2=0 a3=1 items=0 ppid=2203 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:06:01.748000 audit[2242]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:01.748000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6ecbfe0 a2=0 a3=1 items=0 ppid=2203 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:01.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:06:01.788878 kubelet[2203]: E0913 00:06:01.788831 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:01.825000 audit[2078]: USER_END pid=2078 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:06:01.825000 audit[2078]: CRED_DISP pid=2078 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:06:01.827125 sudo[2078]: pam_unix(sudo:session): session closed for user root Sep 13 00:06:01.852997 sshd[2075]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:01.854000 audit[2075]: USER_END pid=2075 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:01.855000 audit[2075]: CRED_DISP pid=2075 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:01.857968 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:06:01.859326 systemd-logind[1801]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:06:01.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.136:22-139.178.89.65:45306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:01.859705 systemd[1]: sshd@6-172.31.31.136:22-139.178.89.65:45306.service: Deactivated successfully. Sep 13 00:06:01.862256 systemd-logind[1801]: Removed session 7. Sep 13 00:06:01.889300 kubelet[2203]: E0913 00:06:01.889207 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:01.989606 kubelet[2203]: E0913 00:06:01.989532 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.090878 kubelet[2203]: E0913 00:06:02.090158 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.190814 kubelet[2203]: E0913 00:06:02.190745 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.291328 kubelet[2203]: E0913 00:06:02.291275 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.294583 kubelet[2203]: I0913 00:06:02.294507 2203 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 00:06:02.294808 kubelet[2203]: W0913 00:06:02.294758 2203 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:06:02.393222 kubelet[2203]: E0913 00:06:02.393054 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.454738 kubelet[2203]: E0913 00:06:02.454663 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:02.493962 kubelet[2203]: E0913 00:06:02.493898 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.595030 kubelet[2203]: E0913 00:06:02.594976 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.696109 kubelet[2203]: E0913 00:06:02.696061 2203 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.136\" not found" Sep 13 00:06:02.797896 kubelet[2203]: I0913 00:06:02.797861 2203 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 00:06:02.798939 env[1812]: time="2025-09-13T00:06:02.798723644Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:06:02.799974 kubelet[2203]: I0913 00:06:02.799944 2203 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 00:06:03.455624 kubelet[2203]: E0913 00:06:03.455553 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:03.456283 kubelet[2203]: I0913 00:06:03.456257 2203 apiserver.go:52] "Watching apiserver" Sep 13 00:06:03.464958 kubelet[2203]: E0913 00:06:03.464889 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:03.475494 systemd[1]: Created slice kubepods-besteffort-pod851f5664_3325_4fc2_b50b_dc8669fe8e18.slice. Sep 13 00:06:03.494079 systemd[1]: Created slice kubepods-besteffort-pod42f0099b_4ca1_4e23_b531_d2af8e9fe405.slice. Sep 13 00:06:03.498134 kubelet[2203]: I0913 00:06:03.498093 2203 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:06:03.504320 kubelet[2203]: I0913 00:06:03.504263 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-cni-log-dir\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.505280 kubelet[2203]: I0913 00:06:03.505226 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/240d2e73-4fb4-4a1c-a4e4-4c043e8c5667-socket-dir\") pod \"csi-node-driver-szb48\" (UID: \"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667\") " pod="calico-system/csi-node-driver-szb48" Sep 13 00:06:03.505663 kubelet[2203]: I0913 00:06:03.505628 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/240d2e73-4fb4-4a1c-a4e4-4c043e8c5667-kubelet-dir\") pod \"csi-node-driver-szb48\" (UID: \"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667\") " pod="calico-system/csi-node-driver-szb48" Sep 13 00:06:03.505896 kubelet[2203]: I0913 00:06:03.505864 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/240d2e73-4fb4-4a1c-a4e4-4c043e8c5667-varrun\") pod \"csi-node-driver-szb48\" (UID: \"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667\") " pod="calico-system/csi-node-driver-szb48" Sep 13 00:06:03.506113 kubelet[2203]: I0913 00:06:03.506063 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/851f5664-3325-4fc2-b50b-dc8669fe8e18-node-certs\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.511733 kubelet[2203]: I0913 00:06:03.511683 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-xtables-lock\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.511980 kubelet[2203]: I0913 00:06:03.511946 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qc9xm\" (UniqueName: \"kubernetes.io/projected/851f5664-3325-4fc2-b50b-dc8669fe8e18-kube-api-access-qc9xm\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.512248 kubelet[2203]: I0913 00:06:03.512209 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-policysync\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.512463 kubelet[2203]: I0913 00:06:03.512418 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-var-run-calico\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.512543 kubelet[2203]: I0913 00:06:03.512517 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dxkxf\" (UniqueName: \"kubernetes.io/projected/240d2e73-4fb4-4a1c-a4e4-4c043e8c5667-kube-api-access-dxkxf\") pod \"csi-node-driver-szb48\" (UID: \"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667\") " pod="calico-system/csi-node-driver-szb48" Sep 13 00:06:03.512653 kubelet[2203]: I0913 00:06:03.512601 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/42f0099b-4ca1-4e23-b531-d2af8e9fe405-xtables-lock\") pod \"kube-proxy-sx9jz\" (UID: \"42f0099b-4ca1-4e23-b531-d2af8e9fe405\") " pod="kube-system/kube-proxy-sx9jz" Sep 13 00:06:03.512748 kubelet[2203]: I0913 00:06:03.512672 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/42f0099b-4ca1-4e23-b531-d2af8e9fe405-lib-modules\") pod \"kube-proxy-sx9jz\" (UID: \"42f0099b-4ca1-4e23-b531-d2af8e9fe405\") " pod="kube-system/kube-proxy-sx9jz" Sep 13 00:06:03.512748 kubelet[2203]: I0913 00:06:03.512722 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-cni-bin-dir\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.512926 kubelet[2203]: I0913 00:06:03.512779 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-flexvol-driver-host\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.512926 kubelet[2203]: I0913 00:06:03.512825 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-lib-modules\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.513059 kubelet[2203]: I0913 00:06:03.512935 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dkm4\" (UniqueName: \"kubernetes.io/projected/42f0099b-4ca1-4e23-b531-d2af8e9fe405-kube-api-access-9dkm4\") pod \"kube-proxy-sx9jz\" (UID: \"42f0099b-4ca1-4e23-b531-d2af8e9fe405\") " pod="kube-system/kube-proxy-sx9jz" Sep 13 00:06:03.513059 kubelet[2203]: I0913 00:06:03.512991 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/240d2e73-4fb4-4a1c-a4e4-4c043e8c5667-registration-dir\") pod \"csi-node-driver-szb48\" (UID: \"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667\") " pod="calico-system/csi-node-driver-szb48" Sep 13 00:06:03.513059 kubelet[2203]: I0913 00:06:03.513043 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/42f0099b-4ca1-4e23-b531-d2af8e9fe405-kube-proxy\") pod \"kube-proxy-sx9jz\" (UID: \"42f0099b-4ca1-4e23-b531-d2af8e9fe405\") " pod="kube-system/kube-proxy-sx9jz" Sep 13 00:06:03.513234 kubelet[2203]: I0913 00:06:03.513089 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-cni-net-dir\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.513234 kubelet[2203]: I0913 00:06:03.513136 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/851f5664-3325-4fc2-b50b-dc8669fe8e18-tigera-ca-bundle\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.513234 kubelet[2203]: I0913 00:06:03.513186 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/851f5664-3325-4fc2-b50b-dc8669fe8e18-var-lib-calico\") pod \"calico-node-f6452\" (UID: \"851f5664-3325-4fc2-b50b-dc8669fe8e18\") " pod="calico-system/calico-node-f6452" Sep 13 00:06:03.616905 kubelet[2203]: I0913 00:06:03.616853 2203 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:06:03.629739 kubelet[2203]: E0913 00:06:03.629696 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:03.629960 kubelet[2203]: W0913 00:06:03.629910 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:03.630131 kubelet[2203]: E0913 00:06:03.630101 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:03.657894 kubelet[2203]: E0913 00:06:03.657851 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:03.658142 kubelet[2203]: W0913 00:06:03.658104 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:03.658280 kubelet[2203]: E0913 00:06:03.658253 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:03.673086 kubelet[2203]: E0913 00:06:03.667826 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:03.673086 kubelet[2203]: W0913 00:06:03.667872 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:03.673086 kubelet[2203]: E0913 00:06:03.667907 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:03.677743 kubelet[2203]: E0913 00:06:03.677699 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:03.678001 kubelet[2203]: W0913 00:06:03.677969 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:03.678138 kubelet[2203]: E0913 00:06:03.678111 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:03.790069 env[1812]: time="2025-09-13T00:06:03.787940281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f6452,Uid:851f5664-3325-4fc2-b50b-dc8669fe8e18,Namespace:calico-system,Attempt:0,}" Sep 13 00:06:03.802764 env[1812]: time="2025-09-13T00:06:03.802144733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sx9jz,Uid:42f0099b-4ca1-4e23-b531-d2af8e9fe405,Namespace:kube-system,Attempt:0,}" Sep 13 00:06:04.306505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3348280543.mount: Deactivated successfully. Sep 13 00:06:04.314977 env[1812]: time="2025-09-13T00:06:04.314913181Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.316850 env[1812]: time="2025-09-13T00:06:04.316793714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.319365 env[1812]: time="2025-09-13T00:06:04.319291087Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.322503 env[1812]: time="2025-09-13T00:06:04.322436913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.327028 env[1812]: time="2025-09-13T00:06:04.326973340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.333145 env[1812]: time="2025-09-13T00:06:04.333090180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.334860 env[1812]: time="2025-09-13T00:06:04.334789738Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.336502 env[1812]: time="2025-09-13T00:06:04.336448343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:04.388443 env[1812]: time="2025-09-13T00:06:04.386940917Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:04.388443 env[1812]: time="2025-09-13T00:06:04.387027887Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:04.388443 env[1812]: time="2025-09-13T00:06:04.387055380Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:04.388443 env[1812]: time="2025-09-13T00:06:04.387675922Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300 pid=2269 runtime=io.containerd.runc.v2 Sep 13 00:06:04.391723 env[1812]: time="2025-09-13T00:06:04.390444882Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:04.391723 env[1812]: time="2025-09-13T00:06:04.390596345Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:04.391723 env[1812]: time="2025-09-13T00:06:04.390627266Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:04.392433 env[1812]: time="2025-09-13T00:06:04.392289562Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59e763f6d117fcd34730cd4cd24fa6a2d1196b60c1b2b2b36b329e68c3679ae4 pid=2268 runtime=io.containerd.runc.v2 Sep 13 00:06:04.428082 systemd[1]: Started cri-containerd-59e763f6d117fcd34730cd4cd24fa6a2d1196b60c1b2b2b36b329e68c3679ae4.scope. Sep 13 00:06:04.446791 systemd[1]: Started cri-containerd-e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300.scope. Sep 13 00:06:04.457460 kubelet[2203]: E0913 00:06:04.457382 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:04.499086 kernel: kauditd_printk_skb: 276 callbacks suppressed Sep 13 00:06:04.499256 kernel: audit: type=1400 audit(1757721964.488:446): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507682 kernel: audit: type=1400 audit(1757721964.488:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.519797 kernel: audit: type=1400 audit(1757721964.488:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.519948 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:06:04.519998 kernel: audit: type=1400 audit(1757721964.488:449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.529847 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:06:04.529976 kernel: audit: type=1400 audit(1757721964.488:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.539156 kernel: audit: backlog limit exceeded Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.547657 kernel: audit: type=1400 audit(1757721964.488:451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.552722 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.490000 audit: BPF prog-id=61 op=LOAD Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2268 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653736336636643131376663643334373330636434636432346661 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2268 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653736336636643131376663643334373330636434636432346661 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit: BPF prog-id=62 op=LOAD Sep 13 00:06:04.507000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2268 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653736336636643131376663643334373330636434636432346661 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.507000 audit: BPF prog-id=63 op=LOAD Sep 13 00:06:04.507000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2268 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653736336636643131376663643334373330636434636432346661 Sep 13 00:06:04.508000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:06:04.508000 audit: BPF prog-id=62 op=UNLOAD Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.508000 audit: BPF prog-id=64 op=LOAD Sep 13 00:06:04.508000 audit[2288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2268 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653736336636643131376663643334373330636434636432346661 Sep 13 00:06:04.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.558000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.558000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363666343532343839326534303261383130303431306266613864 Sep 13 00:06:04.560000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.560000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363666343532343839326534303261383130303431306266613864 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.561000 audit: BPF prog-id=66 op=LOAD Sep 13 00:06:04.561000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363666343532343839326534303261383130303431306266613864 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.563000 audit: BPF prog-id=67 op=LOAD Sep 13 00:06:04.563000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363666343532343839326534303261383130303431306266613864 Sep 13 00:06:04.564000 audit: BPF prog-id=67 op=UNLOAD Sep 13 00:06:04.564000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.564000 audit: BPF prog-id=68 op=LOAD Sep 13 00:06:04.564000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537363666343532343839326534303261383130303431306266613864 Sep 13 00:06:04.585243 env[1812]: time="2025-09-13T00:06:04.585180088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sx9jz,Uid:42f0099b-4ca1-4e23-b531-d2af8e9fe405,Namespace:kube-system,Attempt:0,} returns sandbox id \"59e763f6d117fcd34730cd4cd24fa6a2d1196b60c1b2b2b36b329e68c3679ae4\"" Sep 13 00:06:04.589722 env[1812]: time="2025-09-13T00:06:04.589651628Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Sep 13 00:06:04.596668 env[1812]: time="2025-09-13T00:06:04.596603437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f6452,Uid:851f5664-3325-4fc2-b50b-dc8669fe8e18,Namespace:calico-system,Attempt:0,} returns sandbox id \"e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300\"" Sep 13 00:06:05.457940 kubelet[2203]: E0913 00:06:05.457789 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:05.737224 kubelet[2203]: E0913 00:06:05.737037 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:06.023649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3214758217.mount: Deactivated successfully. Sep 13 00:06:06.458190 kubelet[2203]: E0913 00:06:06.458054 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:06.974662 env[1812]: time="2025-09-13T00:06:06.974528977Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:06.978777 env[1812]: time="2025-09-13T00:06:06.978680062Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:06.980738 env[1812]: time="2025-09-13T00:06:06.980670265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:06.984092 env[1812]: time="2025-09-13T00:06:06.984008872Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:06.984717 env[1812]: time="2025-09-13T00:06:06.984659663Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4\"" Sep 13 00:06:06.988541 env[1812]: time="2025-09-13T00:06:06.988476421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:06:06.991904 env[1812]: time="2025-09-13T00:06:06.991838904Z" level=info msg="CreateContainer within sandbox \"59e763f6d117fcd34730cd4cd24fa6a2d1196b60c1b2b2b36b329e68c3679ae4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:06:07.015657 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount175134917.mount: Deactivated successfully. Sep 13 00:06:07.031649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1760059865.mount: Deactivated successfully. Sep 13 00:06:07.037503 env[1812]: time="2025-09-13T00:06:07.037436608Z" level=info msg="CreateContainer within sandbox \"59e763f6d117fcd34730cd4cd24fa6a2d1196b60c1b2b2b36b329e68c3679ae4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4ed600ae062d7baae2916325199b4f6119ee80fa1107a32d4ee33ddca30ffbe6\"" Sep 13 00:06:07.039712 env[1812]: time="2025-09-13T00:06:07.039625782Z" level=info msg="StartContainer for \"4ed600ae062d7baae2916325199b4f6119ee80fa1107a32d4ee33ddca30ffbe6\"" Sep 13 00:06:07.085983 systemd[1]: Started cri-containerd-4ed600ae062d7baae2916325199b4f6119ee80fa1107a32d4ee33ddca30ffbe6.scope. Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2268 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643630306165303632643762616165323931363332353139396234 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit: BPF prog-id=69 op=LOAD Sep 13 00:06:07.129000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2268 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643630306165303632643762616165323931363332353139396234 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.129000 audit: BPF prog-id=70 op=LOAD Sep 13 00:06:07.129000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2268 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643630306165303632643762616165323931363332353139396234 Sep 13 00:06:07.130000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:06:07.130000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.130000 audit: BPF prog-id=71 op=LOAD Sep 13 00:06:07.130000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2268 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643630306165303632643762616165323931363332353139396234 Sep 13 00:06:07.163025 env[1812]: time="2025-09-13T00:06:07.162960299Z" level=info msg="StartContainer for \"4ed600ae062d7baae2916325199b4f6119ee80fa1107a32d4ee33ddca30ffbe6\" returns successfully" Sep 13 00:06:07.433000 audit[2406]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.433000 audit[2406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff0dea90 a2=0 a3=1 items=0 ppid=2356 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:06:07.437000 audit[2407]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.437000 audit[2407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe79c9b00 a2=0 a3=1 items=0 ppid=2356 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:06:07.440000 audit[2409]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.440000 audit[2409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb5290a0 a2=0 a3=1 items=0 ppid=2356 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:06:07.446000 audit[2410]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.446000 audit[2410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbca2680 a2=0 a3=1 items=0 ppid=2356 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.448000 audit[2411]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.448000 audit[2411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffecb170c0 a2=0 a3=1 items=0 ppid=2356 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:06:07.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:06:07.452000 audit[2413]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.452000 audit[2413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd4de7780 a2=0 a3=1 items=0 ppid=2356 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:06:07.459159 kubelet[2203]: E0913 00:06:07.459069 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:07.548000 audit[2414]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.548000 audit[2414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe5789400 a2=0 a3=1 items=0 ppid=2356 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:06:07.558000 audit[2416]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.558000 audit[2416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeabfdaa0 a2=0 a3=1 items=0 ppid=2356 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:06:07.567000 audit[2419]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.567000 audit[2419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff883e3a0 a2=0 a3=1 items=0 ppid=2356 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:06:07.569000 audit[2420]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.569000 audit[2420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7346ae0 a2=0 a3=1 items=0 ppid=2356 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:06:07.574000 audit[2422]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.574000 audit[2422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffedf4b240 a2=0 a3=1 items=0 ppid=2356 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:06:07.577000 audit[2423]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.577000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6e0d420 a2=0 a3=1 items=0 ppid=2356 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:06:07.582000 audit[2425]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.582000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffccb91e20 a2=0 a3=1 items=0 ppid=2356 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:06:07.591000 audit[2428]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.591000 audit[2428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffefdf8500 a2=0 a3=1 items=0 ppid=2356 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:06:07.594000 audit[2429]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.594000 audit[2429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc54d1a20 a2=0 a3=1 items=0 ppid=2356 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:06:07.599000 audit[2431]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.599000 audit[2431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe3cc95a0 a2=0 a3=1 items=0 ppid=2356 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:06:07.602000 audit[2432]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.602000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1085b90 a2=0 a3=1 items=0 ppid=2356 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:06:07.608000 audit[2434]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.608000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc443b9b0 a2=0 a3=1 items=0 ppid=2356 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:06:07.616000 audit[2437]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.616000 audit[2437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffab48a80 a2=0 a3=1 items=0 ppid=2356 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:06:07.624000 audit[2440]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.624000 audit[2440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc28540b0 a2=0 a3=1 items=0 ppid=2356 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:06:07.627000 audit[2441]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.627000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcb838af0 a2=0 a3=1 items=0 ppid=2356 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:06:07.632000 audit[2443]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.632000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffab0cdf0 a2=0 a3=1 items=0 ppid=2356 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:06:07.677000 audit[2447]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.677000 audit[2447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe0d9c2c0 a2=0 a3=1 items=0 ppid=2356 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:06:07.680000 audit[2448]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.680000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff198c290 a2=0 a3=1 items=0 ppid=2356 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:06:07.685000 audit[2450]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:06:07.685000 audit[2450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe23feeb0 a2=0 a3=1 items=0 ppid=2356 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:06:07.739532 kubelet[2203]: E0913 00:06:07.738755 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:07.754000 audit[2456]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:07.754000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffb2d29a0 a2=0 a3=1 items=0 ppid=2356 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:07.810000 audit[2456]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:07.810000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29052 a0=3 a1=fffffb2d29a0 a2=0 a3=1 items=0 ppid=2356 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:07.828326 kubelet[2203]: E0913 00:06:07.828271 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.828326 kubelet[2203]: W0913 00:06:07.828313 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.828553 kubelet[2203]: E0913 00:06:07.828346 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.828816 kubelet[2203]: E0913 00:06:07.828776 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.828943 kubelet[2203]: W0913 00:06:07.828809 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.828943 kubelet[2203]: E0913 00:06:07.828881 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.830000 audit[2466]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.830890 kubelet[2203]: E0913 00:06:07.829239 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.830890 kubelet[2203]: W0913 00:06:07.829275 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.830890 kubelet[2203]: E0913 00:06:07.829303 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.830890 kubelet[2203]: E0913 00:06:07.829708 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.830890 kubelet[2203]: W0913 00:06:07.829730 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.830890 kubelet[2203]: E0913 00:06:07.829753 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.830890 kubelet[2203]: E0913 00:06:07.830088 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.830890 kubelet[2203]: W0913 00:06:07.830109 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.830890 kubelet[2203]: E0913 00:06:07.830132 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.830890 kubelet[2203]: E0913 00:06:07.830440 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.831445 kubelet[2203]: W0913 00:06:07.830465 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.831445 kubelet[2203]: E0913 00:06:07.830488 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.831445 kubelet[2203]: E0913 00:06:07.830843 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.831445 kubelet[2203]: W0913 00:06:07.830862 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.831445 kubelet[2203]: E0913 00:06:07.830885 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.831445 kubelet[2203]: E0913 00:06:07.831213 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.831445 kubelet[2203]: W0913 00:06:07.831231 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.831445 kubelet[2203]: E0913 00:06:07.831253 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.831924 kubelet[2203]: E0913 00:06:07.831554 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.831924 kubelet[2203]: W0913 00:06:07.831623 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.831924 kubelet[2203]: E0913 00:06:07.831654 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.832097 kubelet[2203]: E0913 00:06:07.831960 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.832097 kubelet[2203]: W0913 00:06:07.831979 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.832097 kubelet[2203]: E0913 00:06:07.831998 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.830000 audit[2466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffeeb6b4c0 a2=0 a3=1 items=0 ppid=2356 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.832506 kubelet[2203]: E0913 00:06:07.832408 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.832506 kubelet[2203]: W0913 00:06:07.832432 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.832506 kubelet[2203]: E0913 00:06:07.832459 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:06:07.833015 kubelet[2203]: E0913 00:06:07.832957 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.833015 kubelet[2203]: W0913 00:06:07.832981 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.833015 kubelet[2203]: E0913 00:06:07.833010 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.833522 kubelet[2203]: E0913 00:06:07.833388 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.833522 kubelet[2203]: W0913 00:06:07.833437 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.833522 kubelet[2203]: E0913 00:06:07.833462 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.836403 kubelet[2203]: E0913 00:06:07.833944 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.836403 kubelet[2203]: W0913 00:06:07.833995 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.836403 kubelet[2203]: E0913 00:06:07.834024 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.836403 kubelet[2203]: E0913 00:06:07.834423 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.836403 kubelet[2203]: W0913 00:06:07.834448 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.836403 kubelet[2203]: E0913 00:06:07.834476 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.836403 kubelet[2203]: E0913 00:06:07.835018 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.836403 kubelet[2203]: W0913 00:06:07.835046 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.836403 kubelet[2203]: E0913 00:06:07.835073 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.836403 kubelet[2203]: E0913 00:06:07.835511 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.837122 kubelet[2203]: W0913 00:06:07.835537 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.837122 kubelet[2203]: E0913 00:06:07.835565 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.837122 kubelet[2203]: E0913 00:06:07.836080 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.837122 kubelet[2203]: W0913 00:06:07.836103 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.837122 kubelet[2203]: E0913 00:06:07.836132 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.837122 kubelet[2203]: E0913 00:06:07.836719 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.837122 kubelet[2203]: W0913 00:06:07.836746 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.837122 kubelet[2203]: E0913 00:06:07.836774 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.837539 kubelet[2203]: E0913 00:06:07.837146 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.837539 kubelet[2203]: W0913 00:06:07.837186 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.837539 kubelet[2203]: E0913 00:06:07.837210 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.840000 audit[2487]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.840000 audit[2487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdfd4bdc0 a2=0 a3=1 items=0 ppid=2356 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:06:07.847746 kubelet[2203]: E0913 00:06:07.847682 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.847746 kubelet[2203]: W0913 00:06:07.847725 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.847973 kubelet[2203]: E0913 00:06:07.847761 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.848381 kubelet[2203]: E0913 00:06:07.848325 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.848381 kubelet[2203]: W0913 00:06:07.848361 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.848624 kubelet[2203]: E0913 00:06:07.848402 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.849004 kubelet[2203]: E0913 00:06:07.848967 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.849115 kubelet[2203]: W0913 00:06:07.849003 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.849115 kubelet[2203]: E0913 00:06:07.849043 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.849540 kubelet[2203]: E0913 00:06:07.849463 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.849540 kubelet[2203]: W0913 00:06:07.849521 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.850006 kubelet[2203]: E0913 00:06:07.849816 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.850908 kubelet[2203]: E0913 00:06:07.850753 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.850908 kubelet[2203]: W0913 00:06:07.850785 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.850908 kubelet[2203]: E0913 00:06:07.850835 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.851282 kubelet[2203]: E0913 00:06:07.851238 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.851282 kubelet[2203]: W0913 00:06:07.851272 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.851468 kubelet[2203]: E0913 00:06:07.851331 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.851000 audit[2490]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.851000 audit[2490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffee031050 a2=0 a3=1 items=0 ppid=2356 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:06:07.852543 kubelet[2203]: E0913 00:06:07.852500 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.852543 kubelet[2203]: W0913 00:06:07.852538 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.852806 kubelet[2203]: E0913 00:06:07.852677 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.853562 kubelet[2203]: E0913 00:06:07.853331 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.853562 kubelet[2203]: W0913 00:06:07.853360 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.853562 kubelet[2203]: E0913 00:06:07.853393 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.854270 kubelet[2203]: E0913 00:06:07.853997 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.854270 kubelet[2203]: W0913 00:06:07.854023 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.854270 kubelet[2203]: E0913 00:06:07.854062 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.854874 kubelet[2203]: E0913 00:06:07.854669 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.854874 kubelet[2203]: W0913 00:06:07.854697 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.855228 kubelet[2203]: E0913 00:06:07.855046 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.855483 kubelet[2203]: E0913 00:06:07.855455 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.855912 kubelet[2203]: W0913 00:06:07.855661 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.855912 kubelet[2203]: E0913 00:06:07.855710 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.857059 kubelet[2203]: E0913 00:06:07.857025 2203 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:06:07.856000 audit[2502]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.856000 audit[2502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2606d20 a2=0 a3=1 items=0 ppid=2356 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:06:07.857696 kubelet[2203]: W0913 00:06:07.857583 2203 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:06:07.857696 kubelet[2203]: E0913 00:06:07.857636 2203 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:06:07.862000 audit[2505]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.862000 audit[2505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdfc1e600 a2=0 a3=1 items=0 ppid=2356 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:06:07.865000 audit[2506]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2506 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.865000 audit[2506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff78afc60 a2=0 a3=1 items=0 ppid=2356 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:06:07.870000 audit[2508]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.870000 audit[2508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe35f1160 a2=0 a3=1 items=0 ppid=2356 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:06:07.877000 audit[2511]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2511 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.877000 audit[2511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffdc29580 a2=0 a3=1 items=0 ppid=2356 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:06:07.880000 audit[2512]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2512 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.880000 audit[2512]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0991f90 a2=0 a3=1 items=0 ppid=2356 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:06:07.886000 audit[2514]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.886000 audit[2514]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1530e20 a2=0 a3=1 items=0 ppid=2356 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:06:07.889000 audit[2515]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.889000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe50bcf20 a2=0 a3=1 items=0 ppid=2356 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:06:07.895000 audit[2517]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.895000 audit[2517]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4d33f50 a2=0 a3=1 items=0 ppid=2356 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:06:07.903000 audit[2520]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2520 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.903000 audit[2520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc520b830 a2=0 a3=1 items=0 ppid=2356 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:06:07.915000 audit[2523]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.915000 audit[2523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3ac5400 a2=0 a3=1 items=0 ppid=2356 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:06:07.919000 audit[2524]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2524 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.919000 audit[2524]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffccd9f60 a2=0 a3=1 items=0 ppid=2356 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:06:07.925000 audit[2526]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2526 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.925000 audit[2526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdc6a0860 a2=0 a3=1 items=0 ppid=2356 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.925000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:06:07.937000 audit[2529]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.937000 audit[2529]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffee8e8010 a2=0 a3=1 items=0 ppid=2356 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:06:07.940000 audit[2530]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2530 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.940000 audit[2530]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4208810 a2=0 a3=1 items=0 ppid=2356 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:06:07.951000 audit[2532]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2532 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.951000 audit[2532]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe960a600 a2=0 a3=1 items=0 ppid=2356 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:06:07.957000 audit[2533]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.957000 audit[2533]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff126970 a2=0 a3=1 items=0 ppid=2356 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:06:07.967000 audit[2535]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2535 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.967000 audit[2535]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffec346ce0 a2=0 a3=1 items=0 ppid=2356 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:06:07.976000 audit[2538]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:06:07.976000 audit[2538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffda4ce680 a2=0 a3=1 items=0 ppid=2356 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:06:07.983000 audit[2540]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2540 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:06:07.983000 audit[2540]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe189e5d0 a2=0 a3=1 items=0 ppid=2356 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.983000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:07.985000 audit[2540]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:06:07.985000 audit[2540]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe189e5d0 a2=0 a3=1 items=0 ppid=2356 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.985000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:08.187000 audit[2542]: NETFILTER_CFG table=filter:65 family=2 entries=11 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:08.187000 audit[2542]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffffe40bbf0 a2=0 a3=1 items=0 ppid=2356 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.187000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:08.193000 audit[2542]: NETFILTER_CFG table=nat:66 family=2 entries=29 op=nft_register_chain pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:08.193000 audit[2542]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=fffffe40bbf0 a2=0 a3=1 items=0 ppid=2356 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:08.217959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3838827518.mount: Deactivated successfully. Sep 13 00:06:08.410443 env[1812]: time="2025-09-13T00:06:08.410384165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:08.414973 env[1812]: time="2025-09-13T00:06:08.414902100Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:08.420208 env[1812]: time="2025-09-13T00:06:08.420135366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:08.424533 env[1812]: time="2025-09-13T00:06:08.424465604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:08.425850 env[1812]: time="2025-09-13T00:06:08.425785624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 13 00:06:08.430229 env[1812]: time="2025-09-13T00:06:08.430176186Z" level=info msg="CreateContainer within sandbox \"e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:06:08.454383 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3957744939.mount: Deactivated successfully. Sep 13 00:06:08.460150 kubelet[2203]: E0913 00:06:08.460086 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:08.470558 env[1812]: time="2025-09-13T00:06:08.470496059Z" level=info msg="CreateContainer within sandbox \"e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50\"" Sep 13 00:06:08.471826 env[1812]: time="2025-09-13T00:06:08.471741969Z" level=info msg="StartContainer for \"0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50\"" Sep 13 00:06:08.512518 systemd[1]: Started cri-containerd-0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50.scope. Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2269 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062336461626330306639336438346363633231363466363037313437 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit: BPF prog-id=72 op=LOAD Sep 13 00:06:08.559000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2269 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062336461626330306639336438346363633231363466363037313437 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit: BPF prog-id=73 op=LOAD Sep 13 00:06:08.559000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2269 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062336461626330306639336438346363633231363466363037313437 Sep 13 00:06:08.559000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:06:08.559000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.559000 audit: BPF prog-id=74 op=LOAD Sep 13 00:06:08.559000 audit[2552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2269 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062336461626330306639336438346363633231363466363037313437 Sep 13 00:06:08.593469 env[1812]: time="2025-09-13T00:06:08.593284855Z" level=info msg="StartContainer for \"0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50\" returns successfully" Sep 13 00:06:08.617268 systemd[1]: cri-containerd-0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50.scope: Deactivated successfully. Sep 13 00:06:08.619000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:06:08.805199 kubelet[2203]: I0913 00:06:08.804994 2203 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sx9jz" podStartSLOduration=5.406391351 podStartE2EDuration="7.804944521s" podCreationTimestamp="2025-09-13 00:06:01 +0000 UTC" firstStartedPulling="2025-09-13 00:06:04.588604583 +0000 UTC m=+4.421758065" lastFinishedPulling="2025-09-13 00:06:06.987157681 +0000 UTC m=+6.820311235" observedRunningTime="2025-09-13 00:06:07.796139978 +0000 UTC m=+7.629293484" watchObservedRunningTime="2025-09-13 00:06:08.804944521 +0000 UTC m=+8.638098039" Sep 13 00:06:08.923925 env[1812]: time="2025-09-13T00:06:08.923863498Z" level=info msg="shim disconnected" id=0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50 Sep 13 00:06:08.924183 env[1812]: time="2025-09-13T00:06:08.924149729Z" level=warning msg="cleaning up after shim disconnected" id=0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50 namespace=k8s.io Sep 13 00:06:08.924306 env[1812]: time="2025-09-13T00:06:08.924277581Z" level=info msg="cleaning up dead shim" Sep 13 00:06:08.939057 env[1812]: time="2025-09-13T00:06:08.939000781Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:06:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2594 runtime=io.containerd.runc.v2\n" Sep 13 00:06:09.143001 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0b3dabc00f93d84ccc2164f607147f4e6acfdd70b6e5774b28aa38d65c6f0c50-rootfs.mount: Deactivated successfully. Sep 13 00:06:09.460976 kubelet[2203]: E0913 00:06:09.460935 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:09.736527 kubelet[2203]: E0913 00:06:09.736378 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:09.776194 env[1812]: time="2025-09-13T00:06:09.776135451Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:06:10.461896 kubelet[2203]: E0913 00:06:10.461813 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:11.462826 kubelet[2203]: E0913 00:06:11.462764 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:11.646000 audit[2608]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.650596 kernel: kauditd_printk_skb: 354 callbacks suppressed Sep 13 00:06:11.650748 kernel: audit: type=1325 audit(1757721971.646:546): table=filter:67 family=2 entries=10 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.646000 audit[2608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffd84e8950 a2=0 a3=1 items=0 ppid=2356 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.667401 kernel: audit: type=1300 audit(1757721971.646:546): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffd84e8950 a2=0 a3=1 items=0 ppid=2356 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.673726 kernel: audit: type=1327 audit(1757721971.646:546): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.676000 audit[2608]: NETFILTER_CFG table=nat:68 family=2 entries=32 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.676000 audit[2608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffd84e8950 a2=0 a3=1 items=0 ppid=2356 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.696382 kernel: audit: type=1325 audit(1757721971.676:547): table=nat:68 family=2 entries=32 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.696495 kernel: audit: type=1300 audit(1757721971.676:547): arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffd84e8950 a2=0 a3=1 items=0 ppid=2356 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.702201 kernel: audit: type=1327 audit(1757721971.676:547): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.740110 kubelet[2203]: E0913 00:06:11.737225 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:12.463631 kubelet[2203]: E0913 00:06:12.463476 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:13.464167 kubelet[2203]: E0913 00:06:13.464089 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:13.739312 kubelet[2203]: E0913 00:06:13.738899 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:13.810739 env[1812]: time="2025-09-13T00:06:13.810658409Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:13.813277 env[1812]: time="2025-09-13T00:06:13.813214782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:13.817190 env[1812]: time="2025-09-13T00:06:13.817124362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:13.819378 env[1812]: time="2025-09-13T00:06:13.819325382Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:13.820638 env[1812]: time="2025-09-13T00:06:13.820560592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 13 00:06:13.825156 env[1812]: time="2025-09-13T00:06:13.825101384Z" level=info msg="CreateContainer within sandbox \"e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:06:13.846679 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2985353845.mount: Deactivated successfully. Sep 13 00:06:13.853957 env[1812]: time="2025-09-13T00:06:13.853844833Z" level=info msg="CreateContainer within sandbox \"e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b\"" Sep 13 00:06:13.854981 env[1812]: time="2025-09-13T00:06:13.854930101Z" level=info msg="StartContainer for \"f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b\"" Sep 13 00:06:13.902866 systemd[1]: Started cri-containerd-f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b.scope. Sep 13 00:06:13.910329 systemd[1]: run-containerd-runc-k8s.io-f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b-runc.E30IZa.mount: Deactivated successfully. Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.973384 kernel: audit: type=1400 audit(1757721973.952:548): avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.973507 kernel: audit: type=1300 audit(1757721973.952:548): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2269 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.952000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2269 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306136346632623639306434323736313136633666616466626333 Sep 13 00:06:13.984321 kernel: audit: type=1327 audit(1757721973.952:548): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306136346632623639306434323736313136633666616466626333 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.992226 kernel: audit: type=1400 audit(1757721973.952:549): avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.952000 audit: BPF prog-id=75 op=LOAD Sep 13 00:06:13.952000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2269 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306136346632623639306434323736313136633666616466626333 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.960000 audit: BPF prog-id=76 op=LOAD Sep 13 00:06:13.960000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2269 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306136346632623639306434323736313136633666616466626333 Sep 13 00:06:13.972000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:06:13.972000 audit: BPF prog-id=75 op=UNLOAD Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:13.972000 audit: BPF prog-id=77 op=LOAD Sep 13 00:06:13.972000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2269 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639306136346632623639306434323736313136633666616466626333 Sep 13 00:06:14.016266 env[1812]: time="2025-09-13T00:06:14.014247744Z" level=info msg="StartContainer for \"f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b\" returns successfully" Sep 13 00:06:14.465852 kubelet[2203]: E0913 00:06:14.465798 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:15.263000 audit[2645]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:15.263000 audit[2645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdc296d90 a2=0 a3=1 items=0 ppid=2356 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:15.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:15.272000 audit[2645]: NETFILTER_CFG table=nat:70 family=2 entries=36 op=nft_register_chain pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:15.272000 audit[2645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffdc296d90 a2=0 a3=1 items=0 ppid=2356 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:15.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:15.322979 env[1812]: time="2025-09-13T00:06:15.322853461Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:06:15.327829 systemd[1]: cri-containerd-f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b.scope: Deactivated successfully. Sep 13 00:06:15.328288 systemd[1]: cri-containerd-f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b.scope: Consumed 1.124s CPU time. Sep 13 00:06:15.331000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:06:15.357006 kubelet[2203]: I0913 00:06:15.356711 2203 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:06:15.367243 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b-rootfs.mount: Deactivated successfully. Sep 13 00:06:15.466716 kubelet[2203]: E0913 00:06:15.466644 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:15.659000 audit[2658]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:15.659000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff8274380 a2=0 a3=1 items=0 ppid=2356 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:15.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:15.670000 audit[2658]: NETFILTER_CFG table=nat:72 family=2 entries=24 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:15.670000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=fffff8274380 a2=0 a3=1 items=0 ppid=2356 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:15.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:15.691614 env[1812]: time="2025-09-13T00:06:15.691504622Z" level=info msg="shim disconnected" id=f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b Sep 13 00:06:15.691968 env[1812]: time="2025-09-13T00:06:15.691615417Z" level=warning msg="cleaning up after shim disconnected" id=f90a64f2b690d4276116c6fadfbc3e88f379400044226dd9859bcd9cbd7c217b namespace=k8s.io Sep 13 00:06:15.691968 env[1812]: time="2025-09-13T00:06:15.691642364Z" level=info msg="cleaning up dead shim" Sep 13 00:06:15.705623 env[1812]: time="2025-09-13T00:06:15.705533915Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:06:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2659 runtime=io.containerd.runc.v2\n" Sep 13 00:06:15.745873 systemd[1]: Created slice kubepods-besteffort-pod240d2e73_4fb4_4a1c_a4e4_4c043e8c5667.slice. Sep 13 00:06:15.751515 env[1812]: time="2025-09-13T00:06:15.751436171Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szb48,Uid:240d2e73-4fb4-4a1c-a4e4-4c043e8c5667,Namespace:calico-system,Attempt:0,}" Sep 13 00:06:15.807703 env[1812]: time="2025-09-13T00:06:15.807639107Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:06:15.925128 env[1812]: time="2025-09-13T00:06:15.924938408Z" level=error msg="Failed to destroy network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:15.928214 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf-shm.mount: Deactivated successfully. Sep 13 00:06:15.930250 env[1812]: time="2025-09-13T00:06:15.930153111Z" level=error msg="encountered an error cleaning up failed sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:15.930402 env[1812]: time="2025-09-13T00:06:15.930255875Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szb48,Uid:240d2e73-4fb4-4a1c-a4e4-4c043e8c5667,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:15.930743 kubelet[2203]: E0913 00:06:15.930645 2203 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:15.930880 kubelet[2203]: E0913 00:06:15.930790 2203 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-szb48" Sep 13 00:06:15.930880 kubelet[2203]: E0913 00:06:15.930828 2203 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-szb48" Sep 13 00:06:15.931019 kubelet[2203]: E0913 00:06:15.930963 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-szb48_calico-system(240d2e73-4fb4-4a1c-a4e4-4c043e8c5667)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-szb48_calico-system(240d2e73-4fb4-4a1c-a4e4-4c043e8c5667)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:16.467561 kubelet[2203]: E0913 00:06:16.467483 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:16.694000 audit[2699]: NETFILTER_CFG table=filter:73 family=2 entries=9 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:16.698201 kernel: kauditd_printk_skb: 52 callbacks suppressed Sep 13 00:06:16.698332 kernel: audit: type=1325 audit(1757721976.694:559): table=filter:73 family=2 entries=9 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:16.694000 audit[2699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc41f3a10 a2=0 a3=1 items=0 ppid=2356 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.715708 kernel: audit: type=1300 audit(1757721976.694:559): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc41f3a10 a2=0 a3=1 items=0 ppid=2356 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.715805 kernel: audit: type=1327 audit(1757721976.694:559): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:16.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:16.702000 audit[2699]: NETFILTER_CFG table=nat:74 family=2 entries=31 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:16.726892 kernel: audit: type=1325 audit(1757721976.702:560): table=nat:74 family=2 entries=31 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:16.702000 audit[2699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffc41f3a10 a2=0 a3=1 items=0 ppid=2356 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.739822 kernel: audit: type=1300 audit(1757721976.702:560): arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffc41f3a10 a2=0 a3=1 items=0 ppid=2356 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:16.745707 kernel: audit: type=1327 audit(1757721976.702:560): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:16.810694 kubelet[2203]: I0913 00:06:16.809845 2203 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:06:16.811086 env[1812]: time="2025-09-13T00:06:16.810943969Z" level=info msg="StopPodSandbox for \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\"" Sep 13 00:06:16.858249 env[1812]: time="2025-09-13T00:06:16.858165104Z" level=error msg="StopPodSandbox for \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\" failed" error="failed to destroy network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:16.858943 kubelet[2203]: E0913 00:06:16.858675 2203 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:06:16.858943 kubelet[2203]: E0913 00:06:16.858771 2203 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf"} Sep 13 00:06:16.858943 kubelet[2203]: E0913 00:06:16.858855 2203 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:06:16.858943 kubelet[2203]: E0913 00:06:16.858896 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-szb48" podUID="240d2e73-4fb4-4a1c-a4e4-4c043e8c5667" Sep 13 00:06:17.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:17.460893 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 13 00:06:17.468420 kubelet[2203]: E0913 00:06:17.468344 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:17.472622 kernel: audit: type=1131 audit(1757721977.459:561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:17.490000 audit: BPF prog-id=58 op=UNLOAD Sep 13 00:06:17.498232 kernel: audit: type=1334 audit(1757721977.490:562): prog-id=58 op=UNLOAD Sep 13 00:06:17.498403 kernel: audit: type=1334 audit(1757721977.490:563): prog-id=57 op=UNLOAD Sep 13 00:06:17.490000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:06:17.490000 audit: BPF prog-id=56 op=UNLOAD Sep 13 00:06:17.501634 kernel: audit: type=1334 audit(1757721977.490:564): prog-id=56 op=UNLOAD Sep 13 00:06:18.468988 kubelet[2203]: E0913 00:06:18.468895 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:19.469156 kubelet[2203]: E0913 00:06:19.469038 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:20.258655 systemd[1]: Created slice kubepods-besteffort-pod6b4fb2fc_8c3f_4141_af6f_0d2e2c074fea.slice. Sep 13 00:06:20.341051 kubelet[2203]: I0913 00:06:20.340974 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6bqgh\" (UniqueName: \"kubernetes.io/projected/6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea-kube-api-access-6bqgh\") pod \"nginx-deployment-7fcdb87857-bf6hz\" (UID: \"6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea\") " pod="default/nginx-deployment-7fcdb87857-bf6hz" Sep 13 00:06:20.469993 kubelet[2203]: E0913 00:06:20.469914 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:20.564946 env[1812]: time="2025-09-13T00:06:20.564377574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bf6hz,Uid:6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea,Namespace:default,Attempt:0,}" Sep 13 00:06:20.713837 env[1812]: time="2025-09-13T00:06:20.713749172Z" level=error msg="Failed to destroy network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:20.717065 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4-shm.mount: Deactivated successfully. Sep 13 00:06:20.721625 env[1812]: time="2025-09-13T00:06:20.719931307Z" level=error msg="encountered an error cleaning up failed sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:20.721625 env[1812]: time="2025-09-13T00:06:20.720093344Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bf6hz,Uid:6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:20.721907 kubelet[2203]: E0913 00:06:20.720564 2203 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:20.721907 kubelet[2203]: E0913 00:06:20.720888 2203 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-bf6hz" Sep 13 00:06:20.721907 kubelet[2203]: E0913 00:06:20.720928 2203 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-bf6hz" Sep 13 00:06:20.722110 kubelet[2203]: E0913 00:06:20.721021 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-bf6hz_default(6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-bf6hz_default(6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-bf6hz" podUID="6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea" Sep 13 00:06:20.820732 kubelet[2203]: I0913 00:06:20.819425 2203 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:06:20.821227 env[1812]: time="2025-09-13T00:06:20.821171732Z" level=info msg="StopPodSandbox for \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\"" Sep 13 00:06:20.890518 env[1812]: time="2025-09-13T00:06:20.890438266Z" level=error msg="StopPodSandbox for \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\" failed" error="failed to destroy network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:06:20.891195 kubelet[2203]: E0913 00:06:20.890975 2203 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:06:20.891195 kubelet[2203]: E0913 00:06:20.891046 2203 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4"} Sep 13 00:06:20.891195 kubelet[2203]: E0913 00:06:20.891100 2203 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:06:20.891195 kubelet[2203]: E0913 00:06:20.891139 2203 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-bf6hz" podUID="6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea" Sep 13 00:06:21.094261 amazon-ssm-agent[1805]: 2025-09-13 00:06:21 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Sep 13 00:06:21.453269 kubelet[2203]: E0913 00:06:21.453176 2203 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:21.470981 kubelet[2203]: E0913 00:06:21.470889 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:22.471372 kubelet[2203]: E0913 00:06:22.471292 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:23.472455 kubelet[2203]: E0913 00:06:23.472384 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:23.725833 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1978196883.mount: Deactivated successfully. Sep 13 00:06:23.783972 env[1812]: time="2025-09-13T00:06:23.783898393Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:23.785872 env[1812]: time="2025-09-13T00:06:23.785826181Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:23.788382 env[1812]: time="2025-09-13T00:06:23.788319231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:23.790711 env[1812]: time="2025-09-13T00:06:23.790665109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:23.791621 env[1812]: time="2025-09-13T00:06:23.791553605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 13 00:06:23.821681 env[1812]: time="2025-09-13T00:06:23.821616405Z" level=info msg="CreateContainer within sandbox \"e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:06:23.844413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1520033487.mount: Deactivated successfully. Sep 13 00:06:23.848827 env[1812]: time="2025-09-13T00:06:23.848764130Z" level=info msg="CreateContainer within sandbox \"e766f4524892e402a8100410bfa8df028a2b3dc274715c0cc9100111a2ef4300\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae\"" Sep 13 00:06:23.849948 env[1812]: time="2025-09-13T00:06:23.849901494Z" level=info msg="StartContainer for \"3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae\"" Sep 13 00:06:23.882523 systemd[1]: Started cri-containerd-3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae.scope. Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2269 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.953862 kernel: audit: type=1400 audit(1757721983.930:565): avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.954000 kernel: audit: type=1300 audit(1757721983.930:565): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2269 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.954068 kernel: audit: type=1327 audit(1757721983.930:565): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373262343139353964376561316130633465613835633963383662 Sep 13 00:06:23.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373262343139353964376561316130633465613835633963383662 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.975048 kernel: audit: type=1400 audit(1757721983.930:566): avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.984488 kernel: audit: type=1400 audit(1757721983.930:566): avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.993972 kernel: audit: type=1400 audit(1757721983.930:566): avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:24.003795 kernel: audit: type=1400 audit(1757721983.930:566): avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:24.021435 kernel: audit: type=1400 audit(1757721983.930:566): avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:24.021590 kernel: audit: type=1400 audit(1757721983.930:566): avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:24.030578 kernel: audit: type=1400 audit(1757721983.930:566): avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.930000 audit: BPF prog-id=78 op=LOAD Sep 13 00:06:23.930000 audit[2771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2269 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373262343139353964376561316130633465613835633963383662 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.931000 audit: BPF prog-id=79 op=LOAD Sep 13 00:06:23.931000 audit[2771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2269 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373262343139353964376561316130633465613835633963383662 Sep 13 00:06:23.940000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:06:23.940000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:23.940000 audit: BPF prog-id=80 op=LOAD Sep 13 00:06:23.940000 audit[2771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2269 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373262343139353964376561316130633465613835633963383662 Sep 13 00:06:24.034233 env[1812]: time="2025-09-13T00:06:24.033158999Z" level=info msg="StartContainer for \"3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae\" returns successfully" Sep 13 00:06:24.287534 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:06:24.287757 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:06:24.473066 kubelet[2203]: E0913 00:06:24.472965 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:24.867506 kubelet[2203]: I0913 00:06:24.867302 2203 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-f6452" podStartSLOduration=4.67305192 podStartE2EDuration="23.867279009s" podCreationTimestamp="2025-09-13 00:06:01 +0000 UTC" firstStartedPulling="2025-09-13 00:06:04.598655629 +0000 UTC m=+4.431809111" lastFinishedPulling="2025-09-13 00:06:23.792882718 +0000 UTC m=+23.626036200" observedRunningTime="2025-09-13 00:06:24.865378077 +0000 UTC m=+24.698531631" watchObservedRunningTime="2025-09-13 00:06:24.867279009 +0000 UTC m=+24.700432503" Sep 13 00:06:25.473251 kubelet[2203]: E0913 00:06:25.473147 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:25.794000 audit[2874]: AVC avc: denied { write } for pid=2874 comm="tee" name="fd" dev="proc" ino=15627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:25.794000 audit[2874]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd440e7da a2=241 a3=1b6 items=1 ppid=2837 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.794000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:06:25.794000 audit: PATH item=0 name="/dev/fd/63" inode=15622 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:25.797000 audit[2872]: AVC avc: denied { write } for pid=2872 comm="tee" name="fd" dev="proc" ino=16426 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:25.805000 audit[2870]: AVC avc: denied { write } for pid=2870 comm="tee" name="fd" dev="proc" ino=15632 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:25.805000 audit[2870]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd78c27db a2=241 a3=1b6 items=1 ppid=2835 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.805000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:06:25.805000 audit: PATH item=0 name="/dev/fd/63" inode=15618 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:25.797000 audit[2872]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdab9c7cb a2=241 a3=1b6 items=1 ppid=2838 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.797000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:06:25.797000 audit: PATH item=0 name="/dev/fd/63" inode=16418 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:25.797000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:25.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:25.805000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:25.814000 audit[2876]: AVC avc: denied { write } for pid=2876 comm="tee" name="fd" dev="proc" ino=16433 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:25.814000 audit[2876]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb1c37da a2=241 a3=1b6 items=1 ppid=2834 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.814000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:06:25.814000 audit: PATH item=0 name="/dev/fd/63" inode=16419 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:25.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:25.817000 audit[2889]: AVC avc: denied { write } for pid=2889 comm="tee" name="fd" dev="proc" ino=16437 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:25.827000 audit[2887]: AVC avc: denied { write } for pid=2887 comm="tee" name="fd" dev="proc" ino=15640 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:25.827000 audit[2887]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc9a227da a2=241 a3=1b6 items=1 ppid=2844 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.827000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:06:25.817000 audit[2889]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd26a17ca a2=241 a3=1b6 items=1 ppid=2843 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.817000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:06:25.817000 audit: PATH item=0 name="/dev/fd/63" inode=16432 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:25.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:25.833000 audit[2899]: AVC avc: denied { write } for pid=2899 comm="tee" name="fd" dev="proc" ino=16444 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:25.833000 audit[2899]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed1967dc a2=241 a3=1b6 items=1 ppid=2846 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.833000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:06:25.833000 audit: PATH item=0 name="/dev/fd/63" inode=16438 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:25.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:25.827000 audit: PATH item=0 name="/dev/fd/63" inode=15634 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:25.827000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:25.840330 kubelet[2203]: I0913 00:06:25.840272 2203 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.312000 audit: BPF prog-id=81 op=LOAD Sep 13 00:06:26.312000 audit[2942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9ee1a48 a2=98 a3=fffff9ee1a38 items=0 ppid=2839 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.312000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:26.314000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.314000 audit: BPF prog-id=82 op=LOAD Sep 13 00:06:26.314000 audit[2942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9ee18f8 a2=74 a3=95 items=0 ppid=2839 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.314000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:26.315000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.315000 audit: BPF prog-id=83 op=LOAD Sep 13 00:06:26.315000 audit[2942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9ee1928 a2=40 a3=fffff9ee1958 items=0 ppid=2839 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.315000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:26.316000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:06:26.317000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.317000 audit[2942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff9ee1a40 a2=50 a3=0 items=0 ppid=2839 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.317000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.320000 audit: BPF prog-id=84 op=LOAD Sep 13 00:06:26.320000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcd747948 a2=98 a3=ffffcd747938 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.321000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.322000 audit: BPF prog-id=85 op=LOAD Sep 13 00:06:26.322000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd7475d8 a2=74 a3=95 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.322000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.323000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.323000 audit: BPF prog-id=86 op=LOAD Sep 13 00:06:26.323000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd747638 a2=94 a3=2 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.323000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.324000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:06:26.474181 kubelet[2203]: E0913 00:06:26.474118 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.494000 audit: BPF prog-id=87 op=LOAD Sep 13 00:06:26.494000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd7475f8 a2=40 a3=ffffcd747628 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.495000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:06:26.495000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.495000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcd747710 a2=50 a3=0 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd747668 a2=28 a3=ffffcd747798 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd747698 a2=28 a3=ffffcd7477c8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd747548 a2=28 a3=ffffcd747678 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7476b8 a2=28 a3=ffffcd7477e8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd747698 a2=28 a3=ffffcd7477c8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd747688 a2=28 a3=ffffcd7477b8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7476b8 a2=28 a3=ffffcd7477e8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd747698 a2=28 a3=ffffcd7477c8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.511000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.511000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd7476b8 a2=28 a3=ffffcd7477e8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.511000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd747688 a2=28 a3=ffffcd7477b8 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.512000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd747708 a2=28 a3=ffffcd747848 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.512000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcd747440 a2=50 a3=0 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.512000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.512000 audit: BPF prog-id=88 op=LOAD Sep 13 00:06:26.512000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcd747448 a2=94 a3=5 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.512000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.513000 audit: BPF prog-id=88 op=UNLOAD Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcd747550 a2=50 a3=0 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.513000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcd747698 a2=4 a3=3 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.513000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.513000 audit[2943]: AVC avc: denied { confidentiality } for pid=2943 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:26.513000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd747678 a2=94 a3=6 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.513000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { confidentiality } for pid=2943 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:26.515000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd746e48 a2=94 a3=83 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.515000 audit[2943]: AVC avc: denied { confidentiality } for pid=2943 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:26.515000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd746e48 a2=94 a3=83 items=0 ppid=2839 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit: BPF prog-id=89 op=LOAD Sep 13 00:06:26.538000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc2635a8 a2=98 a3=fffffc263598 items=0 ppid=2839 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.538000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:06:26.538000 audit: BPF prog-id=89 op=UNLOAD Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.538000 audit: BPF prog-id=90 op=LOAD Sep 13 00:06:26.538000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc263458 a2=74 a3=95 items=0 ppid=2839 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.538000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:06:26.539000 audit: BPF prog-id=90 op=UNLOAD Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.539000 audit: BPF prog-id=91 op=LOAD Sep 13 00:06:26.539000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc263488 a2=40 a3=fffffc2634b8 items=0 ppid=2839 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.539000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:06:26.539000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:06:26.659401 (udev-worker)[2959]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:06:26.672849 systemd-networkd[1534]: vxlan.calico: Link UP Sep 13 00:06:26.672863 systemd-networkd[1534]: vxlan.calico: Gained carrier Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.721000 audit: BPF prog-id=92 op=LOAD Sep 13 00:06:26.721000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdb27db18 a2=98 a3=ffffdb27db08 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.723000 audit: BPF prog-id=92 op=UNLOAD Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.723000 audit: BPF prog-id=93 op=LOAD Sep 13 00:06:26.723000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdb27d7f8 a2=74 a3=95 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.723000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.723000 audit: BPF prog-id=93 op=UNLOAD Sep 13 00:06:26.725944 (udev-worker)[2803]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.726000 audit: BPF prog-id=94 op=LOAD Sep 13 00:06:26.726000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdb27d858 a2=94 a3=2 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.726000 audit: BPF prog-id=94 op=UNLOAD Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb27d888 a2=28 a3=ffffdb27d9b8 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb27d8b8 a2=28 a3=ffffdb27d9e8 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb27d768 a2=28 a3=ffffdb27d898 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb27d8d8 a2=28 a3=ffffdb27da08 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb27d8b8 a2=28 a3=ffffdb27d9e8 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb27d8a8 a2=28 a3=ffffdb27d9d8 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb27d8d8 a2=28 a3=ffffdb27da08 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb27d8b8 a2=28 a3=ffffdb27d9e8 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb27d8d8 a2=28 a3=ffffdb27da08 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb27d8a8 a2=28 a3=ffffdb27d9d8 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb27d928 a2=28 a3=ffffdb27da68 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.727000 audit: BPF prog-id=95 op=LOAD Sep 13 00:06:26.727000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb27d748 a2=40 a3=ffffdb27d778 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.728000 audit: BPF prog-id=95 op=UNLOAD Sep 13 00:06:26.728000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.728000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdb27d770 a2=50 a3=0 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.728000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdb27d770 a2=50 a3=0 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.729000 audit: BPF prog-id=96 op=LOAD Sep 13 00:06:26.729000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb27ced8 a2=94 a3=2 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.730000 audit: BPF prog-id=96 op=UNLOAD Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.730000 audit: BPF prog-id=97 op=LOAD Sep 13 00:06:26.730000 audit[2972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb27d068 a2=94 a3=30 items=0 ppid=2839 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.730000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.737000 audit: BPF prog-id=98 op=LOAD Sep 13 00:06:26.737000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd9e673d8 a2=98 a3=ffffd9e673c8 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.738000 audit: BPF prog-id=98 op=UNLOAD Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit: BPF prog-id=99 op=LOAD Sep 13 00:06:26.738000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd9e67068 a2=74 a3=95 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.738000 audit: BPF prog-id=99 op=UNLOAD Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.738000 audit: BPF prog-id=100 op=LOAD Sep 13 00:06:26.738000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd9e670c8 a2=94 a3=2 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.739000 audit: BPF prog-id=100 op=UNLOAD Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.937000 audit: BPF prog-id=101 op=LOAD Sep 13 00:06:26.937000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd9e67088 a2=40 a3=ffffd9e670b8 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.939000 audit: BPF prog-id=101 op=UNLOAD Sep 13 00:06:26.939000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.939000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd9e671a0 a2=50 a3=0 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.939000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.956000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.956000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd9e670f8 a2=28 a3=ffffd9e67228 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.957000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.957000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9e67128 a2=28 a3=ffffd9e67258 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.957000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.958000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.958000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9e66fd8 a2=28 a3=ffffd9e67108 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.958000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.958000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.958000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd9e67148 a2=28 a3=ffffd9e67278 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.958000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.959000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.959000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd9e67128 a2=28 a3=ffffd9e67258 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.959000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.959000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.959000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd9e67118 a2=28 a3=ffffd9e67248 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.959000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.960000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.960000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd9e67148 a2=28 a3=ffffd9e67278 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.961000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.961000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9e67128 a2=28 a3=ffffd9e67258 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.961000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.961000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9e67148 a2=28 a3=ffffd9e67278 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.962000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.962000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9e67118 a2=28 a3=ffffd9e67248 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.963000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.963000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd9e67198 a2=28 a3=ffffd9e672d8 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.964000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.964000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd9e66ed0 a2=50 a3=0 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.965000 audit: BPF prog-id=102 op=LOAD Sep 13 00:06:26.965000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd9e66ed8 a2=94 a3=5 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.965000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.967000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:06:26.967000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.967000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd9e66fe0 a2=50 a3=0 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.968000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.968000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd9e67128 a2=4 a3=3 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.968000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.969000 audit[2976]: AVC avc: denied { confidentiality } for pid=2976 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:26.969000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd9e67108 a2=94 a3=6 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.969000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.970000 audit[2976]: AVC avc: denied { confidentiality } for pid=2976 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:26.970000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd9e668d8 a2=94 a3=83 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.970000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.972000 audit[2976]: AVC avc: denied { confidentiality } for pid=2976 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:26.972000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd9e668d8 a2=94 a3=83 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.972000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.973000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.973000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd9e68318 a2=10 a3=ffffd9e68408 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.973000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.973000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd9e681d8 a2=10 a3=ffffd9e682c8 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.973000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.973000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd9e68148 a2=10 a3=ffffd9e682c8 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.973000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:26.973000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd9e68148 a2=10 a3=ffffd9e682c8 items=0 ppid=2839 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:26.980000 audit: BPF prog-id=97 op=UNLOAD Sep 13 00:06:26.980000 audit[2982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32 a0=3 a1=ffffd490f860 a2=0 a3=ffffab3b7fa8 items=0 ppid=2839 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.980000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Sep 13 00:06:27.098000 audit[3004]: NETFILTER_CFG table=mangle:75 family=2 entries=16 op=nft_register_chain pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:27.098000 audit[3004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc93d8c50 a2=0 a3=ffffb7c78fa8 items=0 ppid=2839 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.098000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:27.104000 audit[3001]: NETFILTER_CFG table=nat:76 family=2 entries=15 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:27.104000 audit[3001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe9461bb0 a2=0 a3=ffffa1ea3fa8 items=0 ppid=2839 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.104000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:27.110000 audit[3002]: NETFILTER_CFG table=filter:77 family=2 entries=39 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:27.110000 audit[3002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffffe2064f0 a2=0 a3=ffff9bd7cfa8 items=0 ppid=2839 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.110000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:27.112000 audit[3000]: NETFILTER_CFG table=raw:78 family=2 entries=21 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:27.112000 audit[3000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffff284f10 a2=0 a3=ffff99401fa8 items=0 ppid=2839 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.112000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:27.475150 kubelet[2203]: E0913 00:06:27.475085 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:28.475601 kubelet[2203]: E0913 00:06:28.475480 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:28.697836 systemd-networkd[1534]: vxlan.calico: Gained IPv6LL Sep 13 00:06:28.737390 env[1812]: time="2025-09-13T00:06:28.736946756Z" level=info msg="StopPodSandbox for \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\"" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.826 [INFO][3024] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.828 [INFO][3024] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" iface="eth0" netns="/var/run/netns/cni-5856fa27-b2de-1a07-b7c5-96c4862100de" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.829 [INFO][3024] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" iface="eth0" netns="/var/run/netns/cni-5856fa27-b2de-1a07-b7c5-96c4862100de" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.829 [INFO][3024] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" iface="eth0" netns="/var/run/netns/cni-5856fa27-b2de-1a07-b7c5-96c4862100de" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.829 [INFO][3024] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.829 [INFO][3024] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.904 [INFO][3031] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.905 [INFO][3031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.905 [INFO][3031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.918 [WARNING][3031] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.919 [INFO][3031] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.922 [INFO][3031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:28.931234 env[1812]: 2025-09-13 00:06:28.927 [INFO][3024] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:06:28.936708 env[1812]: time="2025-09-13T00:06:28.934648945Z" level=info msg="TearDown network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\" successfully" Sep 13 00:06:28.936708 env[1812]: time="2025-09-13T00:06:28.934703553Z" level=info msg="StopPodSandbox for \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\" returns successfully" Sep 13 00:06:28.934519 systemd[1]: run-netns-cni\x2d5856fa27\x2db2de\x2d1a07\x2db7c5\x2d96c4862100de.mount: Deactivated successfully. Sep 13 00:06:28.937279 env[1812]: time="2025-09-13T00:06:28.936944775Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szb48,Uid:240d2e73-4fb4-4a1c-a4e4-4c043e8c5667,Namespace:calico-system,Attempt:1,}" Sep 13 00:06:29.166302 systemd-networkd[1534]: calif0b24a6e743: Link UP Sep 13 00:06:29.174216 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:29.174369 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif0b24a6e743: link becomes ready Sep 13 00:06:29.175460 systemd-networkd[1534]: calif0b24a6e743: Gained carrier Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.039 [INFO][3037] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.136-k8s-csi--node--driver--szb48-eth0 csi-node-driver- calico-system 240d2e73-4fb4-4a1c-a4e4-4c043e8c5667 1230 0 2025-09-13 00:06:01 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.31.136 csi-node-driver-szb48 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif0b24a6e743 [] [] }} ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.039 [INFO][3037] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.089 [INFO][3050] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" HandleID="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.089 [INFO][3050] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" HandleID="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cb610), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.31.136", "pod":"csi-node-driver-szb48", "timestamp":"2025-09-13 00:06:29.089033855 +0000 UTC"}, Hostname:"172.31.31.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.089 [INFO][3050] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.089 [INFO][3050] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.089 [INFO][3050] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.136' Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.105 [INFO][3050] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.116 [INFO][3050] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.125 [INFO][3050] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.129 [INFO][3050] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.133 [INFO][3050] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.133 [INFO][3050] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.135 [INFO][3050] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.142 [INFO][3050] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.153 [INFO][3050] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.1/26] block=192.168.124.0/26 handle="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.153 [INFO][3050] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.1/26] handle="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" host="172.31.31.136" Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.154 [INFO][3050] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:29.201736 env[1812]: 2025-09-13 00:06:29.154 [INFO][3050] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.1/26] IPv6=[] ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" HandleID="k8s-pod-network.1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:29.203092 env[1812]: 2025-09-13 00:06:29.160 [INFO][3037] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-csi--node--driver--szb48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667", ResourceVersion:"1230", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"", Pod:"csi-node-driver-szb48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0b24a6e743", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:29.203092 env[1812]: 2025-09-13 00:06:29.161 [INFO][3037] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.1/32] ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:29.203092 env[1812]: 2025-09-13 00:06:29.161 [INFO][3037] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif0b24a6e743 ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:29.203092 env[1812]: 2025-09-13 00:06:29.177 [INFO][3037] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:29.203092 env[1812]: 2025-09-13 00:06:29.178 [INFO][3037] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-csi--node--driver--szb48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667", ResourceVersion:"1230", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b", Pod:"csi-node-driver-szb48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0b24a6e743", MAC:"6e:7d:02:7e:c3:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:29.203092 env[1812]: 2025-09-13 00:06:29.198 [INFO][3037] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b" Namespace="calico-system" Pod="csi-node-driver-szb48" WorkloadEndpoint="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:06:29.224316 env[1812]: time="2025-09-13T00:06:29.224207510Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:29.224722 env[1812]: time="2025-09-13T00:06:29.224662721Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:29.224939 env[1812]: time="2025-09-13T00:06:29.224879004Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:29.225405 env[1812]: time="2025-09-13T00:06:29.225345653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b pid=3072 runtime=io.containerd.runc.v2 Sep 13 00:06:29.260969 systemd[1]: Started cri-containerd-1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b.scope. Sep 13 00:06:29.241000 audit[3079]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:29.275506 kernel: kauditd_printk_skb: 592 callbacks suppressed Sep 13 00:06:29.275684 kernel: audit: type=1325 audit(1757721989.241:680): table=filter:79 family=2 entries=38 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:29.241000 audit[3079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffee522a20 a2=0 a3=ffffb0b9afa8 items=0 ppid=2839 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:29.299657 kernel: audit: type=1300 audit(1757721989.241:680): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffee522a20 a2=0 a3=ffffb0b9afa8 items=0 ppid=2839 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:29.241000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:29.310674 kernel: audit: type=1327 audit(1757721989.241:680): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.336895 kernel: audit: type=1400 audit(1757721989.318:681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.337010 kernel: audit: type=1400 audit(1757721989.318:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.344847 kernel: audit: type=1400 audit(1757721989.318:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.353061 kernel: audit: type=1400 audit(1757721989.318:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.353913 kernel: audit: type=1400 audit(1757721989.318:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.361983 kernel: audit: type=1400 audit(1757721989.318:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.370752 kernel: audit: type=1400 audit(1757721989.318:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.319000 audit: BPF prog-id=103 op=LOAD Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3072 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:29.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306434366262396139656364306434623663383230393735636666 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3072 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:29.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306434366262396139656364306434623663383230393735636666 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.320000 audit: BPF prog-id=104 op=LOAD Sep 13 00:06:29.320000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3072 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:29.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306434366262396139656364306434623663383230393735636666 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.327000 audit: BPF prog-id=105 op=LOAD Sep 13 00:06:29.327000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3072 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:29.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306434366262396139656364306434623663383230393735636666 Sep 13 00:06:29.335000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:06:29.335000 audit: BPF prog-id=104 op=UNLOAD Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:29.335000 audit: BPF prog-id=106 op=LOAD Sep 13 00:06:29.335000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3072 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:29.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306434366262396139656364306434623663383230393735636666 Sep 13 00:06:29.403021 env[1812]: time="2025-09-13T00:06:29.402960678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szb48,Uid:240d2e73-4fb4-4a1c-a4e4-4c043e8c5667,Namespace:calico-system,Attempt:1,} returns sandbox id \"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b\"" Sep 13 00:06:29.406457 env[1812]: time="2025-09-13T00:06:29.406295716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:06:29.476459 kubelet[2203]: E0913 00:06:29.476328 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:29.934617 systemd[1]: run-containerd-runc-k8s.io-1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b-runc.UgBWci.mount: Deactivated successfully. Sep 13 00:06:30.048629 kubelet[2203]: I0913 00:06:30.048016 2203 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:06:30.079003 systemd[1]: run-containerd-runc-k8s.io-3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae-runc.v2k0e4.mount: Deactivated successfully. Sep 13 00:06:30.253749 systemd[1]: run-containerd-runc-k8s.io-3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae-runc.iT6dA1.mount: Deactivated successfully. Sep 13 00:06:30.477124 kubelet[2203]: E0913 00:06:30.477072 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:30.846686 env[1812]: time="2025-09-13T00:06:30.846618607Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:30.849342 env[1812]: time="2025-09-13T00:06:30.849278424Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:30.853967 env[1812]: time="2025-09-13T00:06:30.853918733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:30.856871 env[1812]: time="2025-09-13T00:06:30.856818558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:30.857818 env[1812]: time="2025-09-13T00:06:30.857768592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 13 00:06:30.861860 env[1812]: time="2025-09-13T00:06:30.861807069Z" level=info msg="CreateContainer within sandbox \"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:06:30.888659 env[1812]: time="2025-09-13T00:06:30.888555731Z" level=info msg="CreateContainer within sandbox \"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"679e868dfe8849de497d3739cd17b5f89ce3dbdec554baefd8721174e7df8abb\"" Sep 13 00:06:30.890056 env[1812]: time="2025-09-13T00:06:30.890002055Z" level=info msg="StartContainer for \"679e868dfe8849de497d3739cd17b5f89ce3dbdec554baefd8721174e7df8abb\"" Sep 13 00:06:30.928129 systemd[1]: Started cri-containerd-679e868dfe8849de497d3739cd17b5f89ce3dbdec554baefd8721174e7df8abb.scope. Sep 13 00:06:30.975000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.975000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3072 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:30.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396538363864666538383439646534393764333733396364313762 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.976000 audit: BPF prog-id=107 op=LOAD Sep 13 00:06:30.976000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3072 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:30.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396538363864666538383439646534393764333733396364313762 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.978000 audit: BPF prog-id=108 op=LOAD Sep 13 00:06:30.978000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3072 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:30.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396538363864666538383439646534393764333733396364313762 Sep 13 00:06:30.979000 audit: BPF prog-id=108 op=UNLOAD Sep 13 00:06:30.979000 audit: BPF prog-id=107 op=UNLOAD Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { perfmon } for pid=3169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit[3169]: AVC avc: denied { bpf } for pid=3169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:30.979000 audit: BPF prog-id=109 op=LOAD Sep 13 00:06:30.979000 audit[3169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3072 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:30.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396538363864666538383439646534393764333733396364313762 Sep 13 00:06:31.012797 env[1812]: time="2025-09-13T00:06:31.012725991Z" level=info msg="StartContainer for \"679e868dfe8849de497d3739cd17b5f89ce3dbdec554baefd8721174e7df8abb\" returns successfully" Sep 13 00:06:31.016096 env[1812]: time="2025-09-13T00:06:31.016028700Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:06:31.130838 systemd-networkd[1534]: calif0b24a6e743: Gained IPv6LL Sep 13 00:06:31.477970 kubelet[2203]: E0913 00:06:31.477911 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:31.738341 env[1812]: time="2025-09-13T00:06:31.738029589Z" level=info msg="StopPodSandbox for \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\"" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.832 [INFO][3203] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.832 [INFO][3203] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" iface="eth0" netns="/var/run/netns/cni-9603fca5-d919-bd87-7033-52f08cbbf430" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.833 [INFO][3203] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" iface="eth0" netns="/var/run/netns/cni-9603fca5-d919-bd87-7033-52f08cbbf430" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.836 [INFO][3203] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" iface="eth0" netns="/var/run/netns/cni-9603fca5-d919-bd87-7033-52f08cbbf430" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.836 [INFO][3203] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.836 [INFO][3203] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.880 [INFO][3211] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.880 [INFO][3211] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.881 [INFO][3211] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.907 [WARNING][3211] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.907 [INFO][3211] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.917 [INFO][3211] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:31.923668 env[1812]: 2025-09-13 00:06:31.920 [INFO][3203] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:06:31.926156 env[1812]: time="2025-09-13T00:06:31.926061107Z" level=info msg="TearDown network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\" successfully" Sep 13 00:06:31.926298 env[1812]: time="2025-09-13T00:06:31.926263140Z" level=info msg="StopPodSandbox for \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\" returns successfully" Sep 13 00:06:31.927535 env[1812]: time="2025-09-13T00:06:31.927480358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bf6hz,Uid:6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea,Namespace:default,Attempt:1,}" Sep 13 00:06:31.930129 systemd[1]: run-netns-cni\x2d9603fca5\x2dd919\x2dbd87\x2d7033\x2d52f08cbbf430.mount: Deactivated successfully. Sep 13 00:06:32.224435 systemd-networkd[1534]: cali11d4c25a7cf: Link UP Sep 13 00:06:32.231565 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:32.233206 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali11d4c25a7cf: link becomes ready Sep 13 00:06:32.232631 systemd-networkd[1534]: cali11d4c25a7cf: Gained carrier Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.059 [INFO][3218] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0 nginx-deployment-7fcdb87857- default 6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea 1250 0 2025-09-13 00:06:20 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.136 nginx-deployment-7fcdb87857-bf6hz eth0 default [] [] [kns.default ksa.default.default] cali11d4c25a7cf [] [] }} ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.060 [INFO][3218] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.127 [INFO][3231] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" HandleID="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.127 [INFO][3231] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" HandleID="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c5b0), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.136", "pod":"nginx-deployment-7fcdb87857-bf6hz", "timestamp":"2025-09-13 00:06:32.127296085 +0000 UTC"}, Hostname:"172.31.31.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.127 [INFO][3231] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.128 [INFO][3231] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.128 [INFO][3231] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.136' Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.155 [INFO][3231] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.168 [INFO][3231] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.175 [INFO][3231] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.178 [INFO][3231] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.182 [INFO][3231] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.182 [INFO][3231] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.186 [INFO][3231] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.194 [INFO][3231] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.207 [INFO][3231] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.2/26] block=192.168.124.0/26 handle="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.207 [INFO][3231] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.2/26] handle="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" host="172.31.31.136" Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.207 [INFO][3231] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:32.291086 env[1812]: 2025-09-13 00:06:32.208 [INFO][3231] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.2/26] IPv6=[] ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" HandleID="k8s-pod-network.0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:32.292452 env[1812]: 2025-09-13 00:06:32.211 [INFO][3218] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-bf6hz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali11d4c25a7cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:32.292452 env[1812]: 2025-09-13 00:06:32.211 [INFO][3218] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.2/32] ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:32.292452 env[1812]: 2025-09-13 00:06:32.211 [INFO][3218] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali11d4c25a7cf ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:32.292452 env[1812]: 2025-09-13 00:06:32.234 [INFO][3218] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:32.292452 env[1812]: 2025-09-13 00:06:32.244 [INFO][3218] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c", Pod:"nginx-deployment-7fcdb87857-bf6hz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali11d4c25a7cf", MAC:"52:b5:e9:f0:64:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:32.292452 env[1812]: 2025-09-13 00:06:32.287 [INFO][3218] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c" Namespace="default" Pod="nginx-deployment-7fcdb87857-bf6hz" WorkloadEndpoint="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:06:32.321371 env[1812]: time="2025-09-13T00:06:32.321234229Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:32.321613 env[1812]: time="2025-09-13T00:06:32.321325800Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:32.321613 env[1812]: time="2025-09-13T00:06:32.321354568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:32.321841 env[1812]: time="2025-09-13T00:06:32.321762089Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c pid=3257 runtime=io.containerd.runc.v2 Sep 13 00:06:32.352000 audit[3276]: NETFILTER_CFG table=filter:80 family=2 entries=42 op=nft_register_chain pid=3276 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:32.352000 audit[3276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffcbea5750 a2=0 a3=ffffb5528fa8 items=0 ppid=2839 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:32.352000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:32.370885 systemd[1]: Started cri-containerd-0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c.scope. Sep 13 00:06:32.390617 update_engine[1802]: I0913 00:06:32.379547 1802 update_attempter.cc:509] Updating boot flags... Sep 13 00:06:32.395654 systemd[1]: run-containerd-runc-k8s.io-0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c-runc.Ss2EtJ.mount: Deactivated successfully. Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.449000 audit: BPF prog-id=110 op=LOAD Sep 13 00:06:32.449000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.449000 audit[3269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3257 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:32.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313633373665376239663939663232613866343261643862643164 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3257 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:32.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313633373665376239663939663232613866343261643862643164 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit: BPF prog-id=111 op=LOAD Sep 13 00:06:32.450000 audit[3269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3257 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:32.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313633373665376239663939663232613866343261643862643164 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.450000 audit: BPF prog-id=112 op=LOAD Sep 13 00:06:32.450000 audit[3269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3257 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:32.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313633373665376239663939663232613866343261643862643164 Sep 13 00:06:32.450000 audit: BPF prog-id=112 op=UNLOAD Sep 13 00:06:32.451000 audit: BPF prog-id=111 op=UNLOAD Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { perfmon } for pid=3269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit[3269]: AVC avc: denied { bpf } for pid=3269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:32.451000 audit: BPF prog-id=113 op=LOAD Sep 13 00:06:32.451000 audit[3269]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3257 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:32.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313633373665376239663939663232613866343261643862643164 Sep 13 00:06:32.478890 kubelet[2203]: E0913 00:06:32.478735 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:32.531874 env[1812]: time="2025-09-13T00:06:32.531799865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bf6hz,Uid:6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea,Namespace:default,Attempt:1,} returns sandbox id \"0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c\"" Sep 13 00:06:33.198627 env[1812]: time="2025-09-13T00:06:33.198345094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:33.200450 env[1812]: time="2025-09-13T00:06:33.200400737Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:33.202644 env[1812]: time="2025-09-13T00:06:33.202557347Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:33.205289 env[1812]: time="2025-09-13T00:06:33.205225216Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:33.206533 env[1812]: time="2025-09-13T00:06:33.206487484Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 13 00:06:33.210253 env[1812]: time="2025-09-13T00:06:33.210191275Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:06:33.213225 env[1812]: time="2025-09-13T00:06:33.213150525Z" level=info msg="CreateContainer within sandbox \"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:06:33.240695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4041562085.mount: Deactivated successfully. Sep 13 00:06:33.246060 env[1812]: time="2025-09-13T00:06:33.245998733Z" level=info msg="CreateContainer within sandbox \"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"eb2b95848f7d3daae81c444e8885ae055396121c35721ec34e34b596cc655942\"" Sep 13 00:06:33.247457 env[1812]: time="2025-09-13T00:06:33.247404922Z" level=info msg="StartContainer for \"eb2b95848f7d3daae81c444e8885ae055396121c35721ec34e34b596cc655942\"" Sep 13 00:06:33.301287 systemd[1]: run-containerd-runc-k8s.io-eb2b95848f7d3daae81c444e8885ae055396121c35721ec34e34b596cc655942-runc.BFHn7h.mount: Deactivated successfully. Sep 13 00:06:33.313925 systemd[1]: Started cri-containerd-eb2b95848f7d3daae81c444e8885ae055396121c35721ec34e34b596cc655942.scope. Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3072 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:33.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562326239353834386637643364616165383163343434653838383561 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.365000 audit: BPF prog-id=114 op=LOAD Sep 13 00:06:33.365000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3072 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:33.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562326239353834386637643364616165383163343434653838383561 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.367000 audit: BPF prog-id=115 op=LOAD Sep 13 00:06:33.367000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3072 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:33.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562326239353834386637643364616165383163343434653838383561 Sep 13 00:06:33.368000 audit: BPF prog-id=115 op=UNLOAD Sep 13 00:06:33.368000 audit: BPF prog-id=114 op=UNLOAD Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:33.368000 audit: BPF prog-id=116 op=LOAD Sep 13 00:06:33.368000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3072 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:33.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562326239353834386637643364616165383163343434653838383561 Sep 13 00:06:33.403510 env[1812]: time="2025-09-13T00:06:33.403369924Z" level=info msg="StartContainer for \"eb2b95848f7d3daae81c444e8885ae055396121c35721ec34e34b596cc655942\" returns successfully" Sep 13 00:06:33.479629 kubelet[2203]: E0913 00:06:33.479403 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:33.625919 kubelet[2203]: I0913 00:06:33.625844 2203 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:06:33.625919 kubelet[2203]: I0913 00:06:33.625921 2203 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:06:33.892056 kubelet[2203]: I0913 00:06:33.891866 2203 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-szb48" podStartSLOduration=29.088475245 podStartE2EDuration="32.891846118s" podCreationTimestamp="2025-09-13 00:06:01 +0000 UTC" firstStartedPulling="2025-09-13 00:06:29.405774315 +0000 UTC m=+29.238927797" lastFinishedPulling="2025-09-13 00:06:33.209145188 +0000 UTC m=+33.042298670" observedRunningTime="2025-09-13 00:06:33.891141866 +0000 UTC m=+33.724295360" watchObservedRunningTime="2025-09-13 00:06:33.891846118 +0000 UTC m=+33.724999600" Sep 13 00:06:33.946419 systemd-networkd[1534]: cali11d4c25a7cf: Gained IPv6LL Sep 13 00:06:34.480823 kubelet[2203]: E0913 00:06:34.480533 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:35.480786 kubelet[2203]: E0913 00:06:35.480709 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:36.481686 kubelet[2203]: E0913 00:06:36.481595 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:36.736926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount128717735.mount: Deactivated successfully. Sep 13 00:06:37.482068 kubelet[2203]: E0913 00:06:37.481995 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:38.482358 kubelet[2203]: E0913 00:06:38.482300 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:39.043308 env[1812]: time="2025-09-13T00:06:39.043231515Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:39.047735 env[1812]: time="2025-09-13T00:06:39.047660748Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:39.051809 env[1812]: time="2025-09-13T00:06:39.051746057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:39.055768 env[1812]: time="2025-09-13T00:06:39.055695465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:39.057223 env[1812]: time="2025-09-13T00:06:39.057153651Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 00:06:39.063258 env[1812]: time="2025-09-13T00:06:39.063179262Z" level=info msg="CreateContainer within sandbox \"0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 00:06:39.088434 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount613095402.mount: Deactivated successfully. Sep 13 00:06:39.100240 env[1812]: time="2025-09-13T00:06:39.100179015Z" level=info msg="CreateContainer within sandbox \"0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"d5809fd729f51ebf35ef29dcaea3aea91f6def5e6ccdd9e4ebf8a59b5e3810ed\"" Sep 13 00:06:39.101972 env[1812]: time="2025-09-13T00:06:39.101903276Z" level=info msg="StartContainer for \"d5809fd729f51ebf35ef29dcaea3aea91f6def5e6ccdd9e4ebf8a59b5e3810ed\"" Sep 13 00:06:39.149668 systemd[1]: Started cri-containerd-d5809fd729f51ebf35ef29dcaea3aea91f6def5e6ccdd9e4ebf8a59b5e3810ed.scope. Sep 13 00:06:39.186133 kernel: kauditd_printk_skb: 196 callbacks suppressed Sep 13 00:06:39.186269 kernel: audit: type=1400 audit(1757721999.182:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.200313 kernel: audit: type=1400 audit(1757721999.182:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.200450 kernel: audit: type=1400 audit(1757721999.182:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.207556 kernel: audit: type=1400 audit(1757721999.182:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.222623 kernel: audit: type=1400 audit(1757721999.182:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.231436 kernel: audit: type=1400 audit(1757721999.182:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.239551 kernel: audit: type=1400 audit(1757721999.182:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.249650 kernel: audit: type=1400 audit(1757721999.182:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.257331 kernel: audit: type=1400 audit(1757721999.182:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.265077 kernel: audit: type=1400 audit(1757721999.185:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.185000 audit: BPF prog-id=117 op=LOAD Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3257 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:39.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435383039666437323966353165626633356566323964636165613361 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3257 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:39.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435383039666437323966353165626633356566323964636165613361 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.192000 audit: BPF prog-id=118 op=LOAD Sep 13 00:06:39.192000 audit[3526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3257 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:39.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435383039666437323966353165626633356566323964636165613361 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.199000 audit: BPF prog-id=119 op=LOAD Sep 13 00:06:39.199000 audit[3526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3257 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:39.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435383039666437323966353165626633356566323964636165613361 Sep 13 00:06:39.206000 audit: BPF prog-id=119 op=UNLOAD Sep 13 00:06:39.206000 audit: BPF prog-id=118 op=UNLOAD Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.272313 env[1812]: time="2025-09-13T00:06:39.270839942Z" level=info msg="StartContainer for \"d5809fd729f51ebf35ef29dcaea3aea91f6def5e6ccdd9e4ebf8a59b5e3810ed\" returns successfully" Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:39.206000 audit: BPF prog-id=120 op=LOAD Sep 13 00:06:39.206000 audit[3526]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3257 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:39.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435383039666437323966353165626633356566323964636165613361 Sep 13 00:06:39.483521 kubelet[2203]: E0913 00:06:39.483444 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:40.081750 systemd[1]: run-containerd-runc-k8s.io-d5809fd729f51ebf35ef29dcaea3aea91f6def5e6ccdd9e4ebf8a59b5e3810ed-runc.MjRTZD.mount: Deactivated successfully. Sep 13 00:06:40.484343 kubelet[2203]: E0913 00:06:40.484265 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:41.453698 kubelet[2203]: E0913 00:06:41.453651 2203 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:41.484438 kubelet[2203]: E0913 00:06:41.484401 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:42.485284 kubelet[2203]: E0913 00:06:42.485207 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:43.486117 kubelet[2203]: E0913 00:06:43.486028 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:44.488024 kubelet[2203]: E0913 00:06:44.487939 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:45.489831 kubelet[2203]: E0913 00:06:45.489761 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:45.591360 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 00:06:45.591546 kernel: audit: type=1325 audit(1757722005.587:748): table=filter:81 family=2 entries=20 op=nft_register_rule pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.587000 audit[3576]: NETFILTER_CFG table=filter:81 family=2 entries=20 op=nft_register_rule pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.587000 audit[3576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc12bf5b0 a2=0 a3=1 items=0 ppid=2356 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:45.607700 kernel: audit: type=1300 audit(1757722005.587:748): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc12bf5b0 a2=0 a3=1 items=0 ppid=2356 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:45.607815 kernel: audit: type=1327 audit(1757722005.587:748): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:45.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:45.607000 audit[3576]: NETFILTER_CFG table=nat:82 family=2 entries=26 op=nft_register_rule pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.618850 kernel: audit: type=1325 audit(1757722005.607:749): table=nat:82 family=2 entries=26 op=nft_register_rule pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.618939 kernel: audit: type=1300 audit(1757722005.607:749): arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffc12bf5b0 a2=0 a3=1 items=0 ppid=2356 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:45.607000 audit[3576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffc12bf5b0 a2=0 a3=1 items=0 ppid=2356 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:45.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:45.635942 kernel: audit: type=1327 audit(1757722005.607:749): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:45.648000 audit[3578]: NETFILTER_CFG table=filter:83 family=2 entries=32 op=nft_register_rule pid=3578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.648000 audit[3578]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffce50e3d0 a2=0 a3=1 items=0 ppid=2356 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:45.666752 kernel: audit: type=1325 audit(1757722005.648:750): table=filter:83 family=2 entries=32 op=nft_register_rule pid=3578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.666861 kernel: audit: type=1300 audit(1757722005.648:750): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffce50e3d0 a2=0 a3=1 items=0 ppid=2356 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:45.666920 kernel: audit: type=1327 audit(1757722005.648:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:45.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:45.666000 audit[3578]: NETFILTER_CFG table=nat:84 family=2 entries=26 op=nft_register_rule pid=3578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.677922 kernel: audit: type=1325 audit(1757722005.666:751): table=nat:84 family=2 entries=26 op=nft_register_rule pid=3578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:45.666000 audit[3578]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffce50e3d0 a2=0 a3=1 items=0 ppid=2356 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:45.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:45.800142 kubelet[2203]: I0913 00:06:45.799971 2203 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-bf6hz" podStartSLOduration=19.273609345 podStartE2EDuration="25.79995113s" podCreationTimestamp="2025-09-13 00:06:20 +0000 UTC" firstStartedPulling="2025-09-13 00:06:32.533505294 +0000 UTC m=+32.366658788" lastFinishedPulling="2025-09-13 00:06:39.059847103 +0000 UTC m=+38.893000573" observedRunningTime="2025-09-13 00:06:39.901111015 +0000 UTC m=+39.734264533" watchObservedRunningTime="2025-09-13 00:06:45.79995113 +0000 UTC m=+45.633104612" Sep 13 00:06:45.810720 systemd[1]: Created slice kubepods-besteffort-pod6e11f268_ab81_4964_a34f_e25180de860e.slice. Sep 13 00:06:45.902122 kubelet[2203]: I0913 00:06:45.902050 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q6glv\" (UniqueName: \"kubernetes.io/projected/6e11f268-ab81-4964-a34f-e25180de860e-kube-api-access-q6glv\") pod \"nfs-server-provisioner-0\" (UID: \"6e11f268-ab81-4964-a34f-e25180de860e\") " pod="default/nfs-server-provisioner-0" Sep 13 00:06:45.902336 kubelet[2203]: I0913 00:06:45.902216 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6e11f268-ab81-4964-a34f-e25180de860e-data\") pod \"nfs-server-provisioner-0\" (UID: \"6e11f268-ab81-4964-a34f-e25180de860e\") " pod="default/nfs-server-provisioner-0" Sep 13 00:06:46.117746 env[1812]: time="2025-09-13T00:06:46.116910107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6e11f268-ab81-4964-a34f-e25180de860e,Namespace:default,Attempt:0,}" Sep 13 00:06:46.431984 systemd-networkd[1534]: cali60e51b789ff: Link UP Sep 13 00:06:46.439331 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:46.439438 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 00:06:46.439354 systemd-networkd[1534]: cali60e51b789ff: Gained carrier Sep 13 00:06:46.440018 (udev-worker)[3599]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.225 [INFO][3580] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.136-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6e11f268-ab81-4964-a34f-e25180de860e 1323 0 2025-09-13 00:06:45 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.31.136 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.225 [INFO][3580] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.278 [INFO][3593] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" HandleID="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Workload="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.279 [INFO][3593] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" HandleID="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Workload="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c3770), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.136", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 00:06:46.278771137 +0000 UTC"}, Hostname:"172.31.31.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.279 [INFO][3593] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.279 [INFO][3593] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.279 [INFO][3593] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.136' Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.309 [INFO][3593] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.335 [INFO][3593] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.357 [INFO][3593] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.368 [INFO][3593] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.380 [INFO][3593] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.380 [INFO][3593] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.391 [INFO][3593] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.405 [INFO][3593] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.421 [INFO][3593] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.3/26] block=192.168.124.0/26 handle="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.422 [INFO][3593] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.3/26] handle="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" host="172.31.31.136" Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.422 [INFO][3593] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:46.461610 env[1812]: 2025-09-13 00:06:46.422 [INFO][3593] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.3/26] IPv6=[] ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" HandleID="k8s-pod-network.741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Workload="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:06:46.463086 env[1812]: 2025-09-13 00:06:46.425 [INFO][3580] cni-plugin/k8s.go 418: Populated endpoint ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6e11f268-ab81-4964-a34f-e25180de860e", ResourceVersion:"1323", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:46.463086 env[1812]: 2025-09-13 00:06:46.425 [INFO][3580] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.3/32] ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:06:46.463086 env[1812]: 2025-09-13 00:06:46.425 [INFO][3580] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:06:46.463086 env[1812]: 2025-09-13 00:06:46.441 [INFO][3580] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:06:46.463642 env[1812]: 2025-09-13 00:06:46.442 [INFO][3580] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6e11f268-ab81-4964-a34f-e25180de860e", ResourceVersion:"1323", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"9a:10:ca:02:c2:30", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:46.463642 env[1812]: 2025-09-13 00:06:46.458 [INFO][3580] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.136-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:06:46.481751 env[1812]: time="2025-09-13T00:06:46.480213426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:46.481751 env[1812]: time="2025-09-13T00:06:46.480292871Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:46.481751 env[1812]: time="2025-09-13T00:06:46.480319213Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:46.481751 env[1812]: time="2025-09-13T00:06:46.480546076Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce pid=3616 runtime=io.containerd.runc.v2 Sep 13 00:06:46.495859 kubelet[2203]: E0913 00:06:46.493990 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:46.503000 audit[3626]: NETFILTER_CFG table=filter:85 family=2 entries=40 op=nft_register_chain pid=3626 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:46.503000 audit[3626]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffdba2c640 a2=0 a3=ffffa7032fa8 items=0 ppid=2839 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.503000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:46.529353 systemd[1]: Started cri-containerd-741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce.scope. Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.564000 audit: BPF prog-id=121 op=LOAD Sep 13 00:06:46.566000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.566000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3616 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734316565383937396130633064363064376132313838623439376235 Sep 13 00:06:46.566000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.566000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3616 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734316565383937396130633064363064376132313838623439376235 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.567000 audit: BPF prog-id=122 op=LOAD Sep 13 00:06:46.567000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3616 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734316565383937396130633064363064376132313838623439376235 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.569000 audit: BPF prog-id=123 op=LOAD Sep 13 00:06:46.569000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3616 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734316565383937396130633064363064376132313838623439376235 Sep 13 00:06:46.570000 audit: BPF prog-id=123 op=UNLOAD Sep 13 00:06:46.570000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:46.570000 audit: BPF prog-id=124 op=LOAD Sep 13 00:06:46.570000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3616 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734316565383937396130633064363064376132313838623439376235 Sep 13 00:06:46.612814 env[1812]: time="2025-09-13T00:06:46.612748520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6e11f268-ab81-4964-a34f-e25180de860e,Namespace:default,Attempt:0,} returns sandbox id \"741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce\"" Sep 13 00:06:46.616289 env[1812]: time="2025-09-13T00:06:46.616222516Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 00:06:47.022986 systemd[1]: run-containerd-runc-k8s.io-741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce-runc.yuOzK7.mount: Deactivated successfully. Sep 13 00:06:47.494890 kubelet[2203]: E0913 00:06:47.494819 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:47.961919 systemd-networkd[1534]: cali60e51b789ff: Gained IPv6LL Sep 13 00:06:48.495391 kubelet[2203]: E0913 00:06:48.495307 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:49.495979 kubelet[2203]: E0913 00:06:49.495930 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:49.869935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4135886147.mount: Deactivated successfully. Sep 13 00:06:50.497298 kubelet[2203]: E0913 00:06:50.497221 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:51.497778 kubelet[2203]: E0913 00:06:51.497721 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:52.497949 kubelet[2203]: E0913 00:06:52.497865 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:53.407093 env[1812]: time="2025-09-13T00:06:53.407021741Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:53.409870 env[1812]: time="2025-09-13T00:06:53.409802019Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:53.413148 env[1812]: time="2025-09-13T00:06:53.413093523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:53.416470 env[1812]: time="2025-09-13T00:06:53.416411272Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:53.418150 env[1812]: time="2025-09-13T00:06:53.418096302Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 13 00:06:53.423383 env[1812]: time="2025-09-13T00:06:53.423318728Z" level=info msg="CreateContainer within sandbox \"741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 00:06:53.445253 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4292646109.mount: Deactivated successfully. Sep 13 00:06:53.460776 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3003004452.mount: Deactivated successfully. Sep 13 00:06:53.467753 env[1812]: time="2025-09-13T00:06:53.467652454Z" level=info msg="CreateContainer within sandbox \"741ee8979a0c0d60d7a2188b497b50d74c1db8bc861fabf2f010655f71a957ce\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b3cd230da31eebb57bf7c72a0ae723a04fc72a008d00c864846571a4376fd5a7\"" Sep 13 00:06:53.472380 env[1812]: time="2025-09-13T00:06:53.472298587Z" level=info msg="StartContainer for \"b3cd230da31eebb57bf7c72a0ae723a04fc72a008d00c864846571a4376fd5a7\"" Sep 13 00:06:53.498522 kubelet[2203]: E0913 00:06:53.498374 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:53.514404 systemd[1]: Started cri-containerd-b3cd230da31eebb57bf7c72a0ae723a04fc72a008d00c864846571a4376fd5a7.scope. Sep 13 00:06:53.569514 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 13 00:06:53.569700 kernel: audit: type=1400 audit(1757722013.558:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.579451 kernel: audit: type=1400 audit(1757722013.558:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.587936 kernel: audit: type=1400 audit(1757722013.558:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.588065 kernel: audit: type=1400 audit(1757722013.558:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.604220 kernel: audit: type=1400 audit(1757722013.558:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.613062 kernel: audit: type=1400 audit(1757722013.558:776): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.622387 kernel: audit: type=1400 audit(1757722013.558:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.635458 kernel: audit: type=1400 audit(1757722013.558:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.635809 kernel: audit: type=1400 audit(1757722013.558:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.650625 kernel: audit: type=1400 audit(1757722013.561:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.561000 audit: BPF prog-id=125 op=LOAD Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3616 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:53.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636432333064613331656562623537626637633732613061653732 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3616 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:53.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636432333064613331656562623537626637633732613061653732 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit: BPF prog-id=126 op=LOAD Sep 13 00:06:53.569000 audit[3666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3616 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:53.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636432333064613331656562623537626637633732613061653732 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.569000 audit: BPF prog-id=127 op=LOAD Sep 13 00:06:53.569000 audit[3666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3616 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:53.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636432333064613331656562623537626637633732613061653732 Sep 13 00:06:53.570000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:06:53.570000 audit: BPF prog-id=126 op=UNLOAD Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:53.570000 audit: BPF prog-id=128 op=LOAD Sep 13 00:06:53.570000 audit[3666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3616 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:53.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636432333064613331656562623537626637633732613061653732 Sep 13 00:06:53.661936 env[1812]: time="2025-09-13T00:06:53.659370118Z" level=info msg="StartContainer for \"b3cd230da31eebb57bf7c72a0ae723a04fc72a008d00c864846571a4376fd5a7\" returns successfully" Sep 13 00:06:53.787000 audit[3698]: AVC avc: denied { search } for pid=3698 comm="rpcbind" name="crypto" dev="proc" ino=19455 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:06:53.787000 audit[3698]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8fd5f000 a2=0 a3=0 items=0 ppid=3679 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 key=(null) Sep 13 00:06:53.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 00:06:53.868000 audit[3703]: AVC avc: denied { search } for pid=3703 comm="dbus-daemon" name="crypto" dev="proc" ino=19455 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:06:53.868000 audit[3703]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffabb0f000 a2=0 a3=0 items=0 ppid=3679 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 key=(null) Sep 13 00:06:53.868000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:06:53.876000 audit[3704]: AVC avc: denied { watch } for pid=3704 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537405 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c513,c703 tclass=dir permissive=0 Sep 13 00:06:53.876000 audit[3704]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf4174090 a2=2c8 a3=aaaaf414ea60 items=0 ppid=3679 pid=3704 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 key=(null) Sep 13 00:06:53.876000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:06:53.885000 audit[3705]: AVC avc: denied { read } for pid=3705 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=19483 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 00:06:53.885000 audit[3705]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffbd26a570 a2=80000 a3=0 items=0 ppid=3679 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 key=(null) Sep 13 00:06:53.885000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:06:53.887000 audit[3705]: AVC avc: denied { search } for pid=3705 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19455 scontext=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:06:53.887000 audit[3705]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbc5ff000 a2=0 a3=0 items=0 ppid=3679 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c513,c703 key=(null) Sep 13 00:06:53.887000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:06:53.975000 audit[3710]: NETFILTER_CFG table=filter:86 family=2 entries=20 op=nft_register_rule pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:53.975000 audit[3710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe8f35430 a2=0 a3=1 items=0 ppid=2356 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:53.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:53.985000 audit[3710]: NETFILTER_CFG table=nat:87 family=2 entries=110 op=nft_register_chain pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:53.985000 audit[3710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffe8f35430 a2=0 a3=1 items=0 ppid=2356 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:53.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:54.499309 kubelet[2203]: E0913 00:06:54.499237 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:55.500406 kubelet[2203]: E0913 00:06:55.500356 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:56.501211 kubelet[2203]: E0913 00:06:56.501145 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:57.501902 kubelet[2203]: E0913 00:06:57.501856 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:58.503313 kubelet[2203]: E0913 00:06:58.503256 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:06:59.504369 kubelet[2203]: E0913 00:06:59.504292 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:00.265306 systemd[1]: run-containerd-runc-k8s.io-3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae-runc.4bhgsZ.mount: Deactivated successfully. Sep 13 00:07:00.504730 kubelet[2203]: E0913 00:07:00.504660 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:01.453913 kubelet[2203]: E0913 00:07:01.453840 2203 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:01.505692 kubelet[2203]: E0913 00:07:01.505629 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:01.509129 env[1812]: time="2025-09-13T00:07:01.509078071Z" level=info msg="StopPodSandbox for \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\"" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.573 [WARNING][3744] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-csi--node--driver--szb48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667", ResourceVersion:"1272", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b", Pod:"csi-node-driver-szb48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0b24a6e743", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.576 [INFO][3744] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.576 [INFO][3744] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" iface="eth0" netns="" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.576 [INFO][3744] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.576 [INFO][3744] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.622 [INFO][3751] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.623 [INFO][3751] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.623 [INFO][3751] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.642 [WARNING][3751] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.642 [INFO][3751] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.652 [INFO][3751] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:01.657673 env[1812]: 2025-09-13 00:07:01.655 [INFO][3744] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.657673 env[1812]: time="2025-09-13T00:07:01.657607864Z" level=info msg="TearDown network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\" successfully" Sep 13 00:07:01.658546 env[1812]: time="2025-09-13T00:07:01.657679111Z" level=info msg="StopPodSandbox for \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\" returns successfully" Sep 13 00:07:01.659348 env[1812]: time="2025-09-13T00:07:01.659278321Z" level=info msg="RemovePodSandbox for \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\"" Sep 13 00:07:01.659473 env[1812]: time="2025-09-13T00:07:01.659345164Z" level=info msg="Forcibly stopping sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\"" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.720 [WARNING][3765] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-csi--node--driver--szb48-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"240d2e73-4fb4-4a1c-a4e4-4c043e8c5667", ResourceVersion:"1272", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"1f0d46bb9a9ecd0d4b6c820975cff6a57bcf3fb5c6133c6f8e1dafbf9a14ec7b", Pod:"csi-node-driver-szb48", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif0b24a6e743", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.721 [INFO][3765] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.721 [INFO][3765] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" iface="eth0" netns="" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.721 [INFO][3765] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.721 [INFO][3765] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.798 [INFO][3772] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.798 [INFO][3772] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.799 [INFO][3772] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.819 [WARNING][3772] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.819 [INFO][3772] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" HandleID="k8s-pod-network.4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Workload="172.31.31.136-k8s-csi--node--driver--szb48-eth0" Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.822 [INFO][3772] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:01.828171 env[1812]: 2025-09-13 00:07:01.824 [INFO][3765] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf" Sep 13 00:07:01.829086 env[1812]: time="2025-09-13T00:07:01.828118761Z" level=info msg="TearDown network for sandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\" successfully" Sep 13 00:07:01.836147 env[1812]: time="2025-09-13T00:07:01.836088422Z" level=info msg="RemovePodSandbox \"4869804b36a66b32aa4831eafeaaa18df301d9e9e5c7586cff730b6d042371cf\" returns successfully" Sep 13 00:07:01.837192 env[1812]: time="2025-09-13T00:07:01.837145113Z" level=info msg="StopPodSandbox for \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\"" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.902 [WARNING][3788] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c", Pod:"nginx-deployment-7fcdb87857-bf6hz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali11d4c25a7cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.902 [INFO][3788] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.902 [INFO][3788] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" iface="eth0" netns="" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.902 [INFO][3788] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.902 [INFO][3788] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.949 [INFO][3795] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.949 [INFO][3795] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.949 [INFO][3795] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.962 [WARNING][3795] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.962 [INFO][3795] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.964 [INFO][3795] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:01.969302 env[1812]: 2025-09-13 00:07:01.966 [INFO][3788] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:01.969302 env[1812]: time="2025-09-13T00:07:01.969343528Z" level=info msg="TearDown network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\" successfully" Sep 13 00:07:01.969302 env[1812]: time="2025-09-13T00:07:01.969389334Z" level=info msg="StopPodSandbox for \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\" returns successfully" Sep 13 00:07:01.970785 env[1812]: time="2025-09-13T00:07:01.970741910Z" level=info msg="RemovePodSandbox for \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\"" Sep 13 00:07:01.971086 env[1812]: time="2025-09-13T00:07:01.970989864Z" level=info msg="Forcibly stopping sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\"" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.042 [WARNING][3810] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"6b4fb2fc-8c3f-4141-af6f-0d2e2c074fea", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"0816376e7b9f99f22a8f42ad8bd1d6083153b5219c7e0bbbfbf6f82c4fbdaf1c", Pod:"nginx-deployment-7fcdb87857-bf6hz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali11d4c25a7cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.043 [INFO][3810] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.043 [INFO][3810] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" iface="eth0" netns="" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.043 [INFO][3810] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.043 [INFO][3810] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.082 [INFO][3817] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.082 [INFO][3817] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.082 [INFO][3817] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.111 [WARNING][3817] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.111 [INFO][3817] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" HandleID="k8s-pod-network.41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Workload="172.31.31.136-k8s-nginx--deployment--7fcdb87857--bf6hz-eth0" Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.121 [INFO][3817] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:02.126704 env[1812]: 2025-09-13 00:07:02.123 [INFO][3810] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4" Sep 13 00:07:02.127764 env[1812]: time="2025-09-13T00:07:02.127711286Z" level=info msg="TearDown network for sandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\" successfully" Sep 13 00:07:02.134149 env[1812]: time="2025-09-13T00:07:02.134092603Z" level=info msg="RemovePodSandbox \"41b61aa6691befab8f7f4c2d5bd75af31a4d4412caefe6ea5384635c93fd90a4\" returns successfully" Sep 13 00:07:02.506767 kubelet[2203]: E0913 00:07:02.506692 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:03.507529 kubelet[2203]: E0913 00:07:03.507456 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:04.508592 kubelet[2203]: E0913 00:07:04.508509 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:05.508734 kubelet[2203]: E0913 00:07:05.508685 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:06.510393 kubelet[2203]: E0913 00:07:06.510317 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:07.513276 kubelet[2203]: E0913 00:07:07.513232 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:08.514904 kubelet[2203]: E0913 00:07:08.514840 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:09.515082 kubelet[2203]: E0913 00:07:09.515012 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:10.515924 kubelet[2203]: E0913 00:07:10.515879 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:11.516913 kubelet[2203]: E0913 00:07:11.516865 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:12.518430 kubelet[2203]: E0913 00:07:12.518360 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:13.519499 kubelet[2203]: E0913 00:07:13.519200 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:14.519440 kubelet[2203]: E0913 00:07:14.519356 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:15.520105 kubelet[2203]: E0913 00:07:15.520028 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:16.520999 kubelet[2203]: E0913 00:07:16.520919 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:17.521424 kubelet[2203]: E0913 00:07:17.521350 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:18.522352 kubelet[2203]: E0913 00:07:18.522276 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:18.775739 kubelet[2203]: I0913 00:07:18.775439 2203 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=26.969961002 podStartE2EDuration="33.775418722s" podCreationTimestamp="2025-09-13 00:06:45 +0000 UTC" firstStartedPulling="2025-09-13 00:06:46.615304829 +0000 UTC m=+46.448458323" lastFinishedPulling="2025-09-13 00:06:53.420762561 +0000 UTC m=+53.253916043" observedRunningTime="2025-09-13 00:06:53.943633904 +0000 UTC m=+53.776787398" watchObservedRunningTime="2025-09-13 00:07:18.775418722 +0000 UTC m=+78.608572204" Sep 13 00:07:18.786467 systemd[1]: Created slice kubepods-besteffort-podabcc2b78_7734_43fd_a524_9a37e3c85f34.slice. Sep 13 00:07:18.910994 kubelet[2203]: I0913 00:07:18.910945 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kdnxg\" (UniqueName: \"kubernetes.io/projected/abcc2b78-7734-43fd-a524-9a37e3c85f34-kube-api-access-kdnxg\") pod \"test-pod-1\" (UID: \"abcc2b78-7734-43fd-a524-9a37e3c85f34\") " pod="default/test-pod-1" Sep 13 00:07:18.911295 kubelet[2203]: I0913 00:07:18.911252 2203 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-42cf6515-bc08-4a60-a41f-34da4cf567bf\" (UniqueName: \"kubernetes.io/nfs/abcc2b78-7734-43fd-a524-9a37e3c85f34-pvc-42cf6515-bc08-4a60-a41f-34da4cf567bf\") pod \"test-pod-1\" (UID: \"abcc2b78-7734-43fd-a524-9a37e3c85f34\") " pod="default/test-pod-1" Sep 13 00:07:19.045842 kernel: Failed to create system directory netfs Sep 13 00:07:19.046017 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 00:07:19.046074 kernel: audit: type=1400 audit(1757722039.041:796): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.041000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.055789 kernel: Failed to create system directory netfs Sep 13 00:07:19.055909 kernel: audit: type=1400 audit(1757722039.041:796): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.041000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.065721 kernel: Failed to create system directory netfs Sep 13 00:07:19.065838 kernel: audit: type=1400 audit(1757722039.041:796): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.041000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.075582 kernel: Failed to create system directory netfs Sep 13 00:07:19.075679 kernel: audit: type=1400 audit(1757722039.041:796): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.041000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.041000 audit[3851]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae6dfc5e0 a1=12c14 a2=aaaadfade028 a3=aaaae6ded010 items=0 ppid=579 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:19.098393 kernel: audit: type=1300 audit(1757722039.041:796): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae6dfc5e0 a1=12c14 a2=aaaadfade028 a3=aaaae6ded010 items=0 ppid=579 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:19.098533 kernel: audit: type=1327 audit(1757722039.041:796): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:07:19.041000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.117361 kernel: Failed to create system directory fscache Sep 13 00:07:19.117458 kernel: audit: type=1400 audit(1757722039.086:797): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.117517 kernel: Failed to create system directory fscache Sep 13 00:07:19.117558 kernel: audit: type=1400 audit(1757722039.086:797): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.127305 kernel: Failed to create system directory fscache Sep 13 00:07:19.127372 kernel: audit: type=1400 audit(1757722039.086:797): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.137117 kernel: Failed to create system directory fscache Sep 13 00:07:19.137194 kernel: audit: type=1400 audit(1757722039.086:797): avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.147134 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.149366 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.151597 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.155679 kernel: Failed to create system directory fscache Sep 13 00:07:19.155778 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.157805 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.159907 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.161983 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.164054 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.166135 kernel: Failed to create system directory fscache Sep 13 00:07:19.086000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.086000 audit[3851]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae700f210 a1=4c344 a2=aaaadfade028 a3=aaaae6ded010 items=0 ppid=579 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:19.168754 kernel: FS-Cache: Loaded Sep 13 00:07:19.086000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.209523 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.209661 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.209726 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.213355 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.213453 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.217143 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.217221 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.220983 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.221050 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.224646 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.224709 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.228365 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.228625 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.232300 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.232367 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.235981 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.236046 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.239639 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.239702 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.243300 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.243374 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.246979 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.247029 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.250613 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.250673 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.254296 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.254372 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.258000 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.258075 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.261720 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.261792 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.263634 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.267295 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.267349 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.270962 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.271025 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.274608 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.274672 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.278232 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.278295 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.281892 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.281954 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.285534 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.285607 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.289218 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.289288 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.292876 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.292940 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.296523 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.296627 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.303626 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.303726 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.307235 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.307374 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.311033 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.311205 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.314690 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.314775 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.318336 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.318417 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.322008 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.322102 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.325606 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.325677 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.329180 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.329262 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.332804 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.332896 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.334621 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.338245 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.338317 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.341824 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.341898 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.345462 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.345592 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.349064 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.349152 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.352679 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.352747 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.354482 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.358119 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.358175 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.361814 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.361913 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.363697 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.367275 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.367331 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.369009 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.370851 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.372579 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.374483 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.376193 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.378127 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.381723 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.381781 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.383441 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.385352 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.387082 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.388946 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.392547 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.392635 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.394278 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.396172 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.397902 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.399812 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.401671 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.405354 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.405447 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.407099 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.408976 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.410706 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.412579 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.414310 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.416189 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.417925 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.419784 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.421524 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.423400 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.425162 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.427088 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.428782 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.430639 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.432448 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.436099 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.436193 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.437838 kernel: Failed to create system directory sunrpc Sep 13 00:07:19.195000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.451585 kernel: RPC: Registered named UNIX socket transport module. Sep 13 00:07:19.451727 kernel: RPC: Registered udp transport module. Sep 13 00:07:19.451809 kernel: RPC: Registered tcp transport module. Sep 13 00:07:19.453245 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 00:07:19.195000 audit[3851]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae705b560 a1=14a804 a2=aaaadfade028 a3=aaaae6ded010 items=6 ppid=579 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:19.195000 audit: CWD cwd="/" Sep 13 00:07:19.195000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:07:19.195000 audit: PATH item=1 name=(null) inode=20506 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:07:19.195000 audit: PATH item=2 name=(null) inode=20506 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:07:19.195000 audit: PATH item=3 name=(null) inode=20507 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:07:19.195000 audit: PATH item=4 name=(null) inode=20506 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:07:19.195000 audit: PATH item=5 name=(null) inode=20508 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:07:19.195000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.506994 kernel: Failed to create system directory nfs Sep 13 00:07:19.507093 kernel: Failed to create system directory nfs Sep 13 00:07:19.507139 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.508713 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.510427 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.512139 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.513873 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.515631 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.517309 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.519024 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.520777 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.522564 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.522795 kubelet[2203]: E0913 00:07:19.522481 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:19.524246 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.525975 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.527695 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.529368 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.531107 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.532801 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.534509 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.536225 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.537972 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.539698 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.541422 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.543127 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.544866 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.546542 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.548306 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.556913 kernel: Failed to create system directory nfs Sep 13 00:07:19.557029 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.558542 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.560354 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.563893 kernel: Failed to create system directory nfs Sep 13 00:07:19.564003 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.567317 kernel: Failed to create system directory nfs Sep 13 00:07:19.567375 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.570748 kernel: Failed to create system directory nfs Sep 13 00:07:19.570839 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.572590 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.574227 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.579651 kernel: Failed to create system directory nfs Sep 13 00:07:19.579783 kernel: Failed to create system directory nfs Sep 13 00:07:19.579839 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.582893 kernel: Failed to create system directory nfs Sep 13 00:07:19.582988 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.586345 kernel: Failed to create system directory nfs Sep 13 00:07:19.586401 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.588023 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.589808 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.591444 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.594294 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.596732 kernel: Failed to create system directory nfs Sep 13 00:07:19.596817 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.598375 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.600167 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.603634 kernel: Failed to create system directory nfs Sep 13 00:07:19.603718 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.605290 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.607059 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.608718 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.610482 kernel: Failed to create system directory nfs Sep 13 00:07:19.495000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.495000 audit[3851]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae7204b50 a1=116324 a2=aaaadfade028 a3=aaaae6ded010 items=0 ppid=579 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:19.642847 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 00:07:19.495000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.695712 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.695806 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.695870 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.699151 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.699204 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.700843 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.702673 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.704347 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.706156 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.707976 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.709758 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.711437 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.713255 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.716756 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.716815 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.718514 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.720290 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.722062 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.723832 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.725619 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.727355 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.729156 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.730911 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.732691 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.734427 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.738910 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.739035 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.742137 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.744373 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.744499 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.746301 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.749850 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.749957 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.753427 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.753509 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.757004 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.757092 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.760549 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.760634 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.764205 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.764303 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.767717 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.767798 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.771229 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.771308 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.774764 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.774872 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.778287 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.778379 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.781849 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.781939 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.783669 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.787150 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.787231 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.790690 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.790768 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.794237 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.794317 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.797788 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.797883 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.801341 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.807554 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.807630 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.811027 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.811111 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.814546 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.814683 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.818222 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.818308 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.821762 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.821856 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.825469 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.825815 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.828857 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.828950 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.832432 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.832487 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.836054 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.836125 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.837670 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.839497 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.843026 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.843077 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.844802 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.846598 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.848363 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.850176 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.851939 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.853715 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.855462 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.857267 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.859043 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.860832 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:19.862673 kernel: Failed to create system directory nfs4 Sep 13 00:07:19.679000 audit[3856]: AVC avc: denied { confidentiality } for pid=3856 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.042072 kernel: NFS: Registering the id_resolver key type Sep 13 00:07:20.042248 kernel: Key type id_resolver registered Sep 13 00:07:20.042320 kernel: Key type id_legacy registered Sep 13 00:07:19.679000 audit[3856]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb8e9a010 a1=19c744 a2=aaaada6de028 a3=aaaae2ab0010 items=0 ppid=579 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:19.679000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.067834 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.067905 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.069911 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.071860 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.073777 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.075806 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.077789 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.079749 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.081678 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.083631 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.085600 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.087533 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.089531 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.091741 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.093663 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.095652 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.097588 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.099501 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.103292 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.103343 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.103442 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.107255 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.109241 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.111156 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.113083 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: AVC avc: denied { confidentiality } for pid=3857 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:07:20.115030 kernel: Failed to create system directory rpcgss Sep 13 00:07:20.059000 audit[3857]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff96762010 a1=5eedc a2=aaaae693e028 a3=aaab0b498010 items=0 ppid=579 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.059000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 00:07:20.150234 nfsidmap[3866]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 13 00:07:20.157158 nfsidmap[3867]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 13 00:07:20.175000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:07:20.175000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:07:20.175000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:07:20.175000 audit[2010]: AVC avc: denied { watch_reads } for pid=2010 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:07:20.175000 audit[2010]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf00f95b0 a2=10 a3=0 items=0 ppid=1 pid=2010 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.175000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:07:20.176000 audit[2010]: AVC avc: denied { watch_reads } for pid=2010 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:07:20.176000 audit[2010]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf00f95b0 a2=10 a3=0 items=0 ppid=1 pid=2010 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.176000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:07:20.176000 audit[2010]: AVC avc: denied { watch_reads } for pid=2010 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:07:20.176000 audit[2010]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf00f95b0 a2=10 a3=0 items=0 ppid=1 pid=2010 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.176000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:07:20.294340 env[1812]: time="2025-09-13T00:07:20.293828915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:abcc2b78-7734-43fd-a524-9a37e3c85f34,Namespace:default,Attempt:0,}" Sep 13 00:07:20.523130 kubelet[2203]: E0913 00:07:20.523057 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:20.561099 (udev-worker)[3852]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:07:20.570777 systemd-networkd[1534]: cali5ec59c6bf6e: Link UP Sep 13 00:07:20.580859 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:07:20.580963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 00:07:20.582391 systemd-networkd[1534]: cali5ec59c6bf6e: Gained carrier Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.402 [INFO][3870] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.136-k8s-test--pod--1-eth0 default abcc2b78-7734-43fd-a524-9a37e3c85f34 1418 0 2025-09-13 00:06:46 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.136 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.402 [INFO][3870] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-eth0" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.450 [INFO][3883] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" HandleID="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Workload="172.31.31.136-k8s-test--pod--1-eth0" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.451 [INFO][3883] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" HandleID="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Workload="172.31.31.136-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3640), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.136", "pod":"test-pod-1", "timestamp":"2025-09-13 00:07:20.450736285 +0000 UTC"}, Hostname:"172.31.31.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.451 [INFO][3883] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.451 [INFO][3883] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.451 [INFO][3883] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.136' Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.483 [INFO][3883] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.501 [INFO][3883] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.512 [INFO][3883] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.515 [INFO][3883] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.520 [INFO][3883] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.520 [INFO][3883] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.523 [INFO][3883] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.531 [INFO][3883] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.553 [INFO][3883] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.4/26] block=192.168.124.0/26 handle="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.553 [INFO][3883] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.4/26] handle="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" host="172.31.31.136" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.553 [INFO][3883] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.553 [INFO][3883] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.4/26] IPv6=[] ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" HandleID="k8s-pod-network.fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Workload="172.31.31.136-k8s-test--pod--1-eth0" Sep 13 00:07:20.620814 env[1812]: 2025-09-13 00:07:20.556 [INFO][3870] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"abcc2b78-7734-43fd-a524-9a37e3c85f34", ResourceVersion:"1418", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:20.622440 env[1812]: 2025-09-13 00:07:20.557 [INFO][3870] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.4/32] ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-eth0" Sep 13 00:07:20.622440 env[1812]: 2025-09-13 00:07:20.557 [INFO][3870] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-eth0" Sep 13 00:07:20.622440 env[1812]: 2025-09-13 00:07:20.583 [INFO][3870] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-eth0" Sep 13 00:07:20.622440 env[1812]: 2025-09-13 00:07:20.584 [INFO][3870] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.136-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"abcc2b78-7734-43fd-a524-9a37e3c85f34", ResourceVersion:"1418", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.136", ContainerID:"fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e2:c8:ed:ea:8d:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:20.622440 env[1812]: 2025-09-13 00:07:20.617 [INFO][3870] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.136-k8s-test--pod--1-eth0" Sep 13 00:07:20.646349 env[1812]: time="2025-09-13T00:07:20.646223321Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:07:20.646692 env[1812]: time="2025-09-13T00:07:20.646626305Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:07:20.647014 env[1812]: time="2025-09-13T00:07:20.646887349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:07:20.647666 env[1812]: time="2025-09-13T00:07:20.647541334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f pid=3903 runtime=io.containerd.runc.v2 Sep 13 00:07:20.678000 audit[3916]: NETFILTER_CFG table=filter:88 family=2 entries=40 op=nft_register_chain pid=3916 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:07:20.678000 audit[3916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffffe7d3190 a2=0 a3=ffffbecebfa8 items=0 ppid=2839 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.678000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:07:20.692490 systemd[1]: Started cri-containerd-fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f.scope. Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.743000 audit: BPF prog-id=129 op=LOAD Sep 13 00:07:20.745000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.745000 audit[3914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3903 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393030323834393835616266303639313561343664643931646161 Sep 13 00:07:20.745000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.745000 audit[3914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3903 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393030323834393835616266303639313561343664643931646161 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.746000 audit: BPF prog-id=130 op=LOAD Sep 13 00:07:20.746000 audit[3914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3903 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393030323834393835616266303639313561343664643931646161 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.748000 audit: BPF prog-id=131 op=LOAD Sep 13 00:07:20.748000 audit[3914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3903 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393030323834393835616266303639313561343664643931646161 Sep 13 00:07:20.749000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:07:20.749000 audit: BPF prog-id=130 op=UNLOAD Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:20.750000 audit: BPF prog-id=132 op=LOAD Sep 13 00:07:20.750000 audit[3914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3903 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:20.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393030323834393835616266303639313561343664643931646161 Sep 13 00:07:20.796529 env[1812]: time="2025-09-13T00:07:20.796366032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:abcc2b78-7734-43fd-a524-9a37e3c85f34,Namespace:default,Attempt:0,} returns sandbox id \"fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f\"" Sep 13 00:07:20.802471 env[1812]: time="2025-09-13T00:07:20.802409997Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:07:21.137242 env[1812]: time="2025-09-13T00:07:21.137107368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:07:21.142288 env[1812]: time="2025-09-13T00:07:21.142236207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:07:21.146069 env[1812]: time="2025-09-13T00:07:21.146019803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:07:21.149922 env[1812]: time="2025-09-13T00:07:21.149869978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:07:21.151262 env[1812]: time="2025-09-13T00:07:21.151218412Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 00:07:21.156227 env[1812]: time="2025-09-13T00:07:21.156147600Z" level=info msg="CreateContainer within sandbox \"fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 00:07:21.185015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1149186566.mount: Deactivated successfully. Sep 13 00:07:21.194536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4108099851.mount: Deactivated successfully. Sep 13 00:07:21.210043 env[1812]: time="2025-09-13T00:07:21.209982282Z" level=info msg="CreateContainer within sandbox \"fa900284985abf06915a46dd91daa72fd6fc6dee6ba73a55011efab7275fea3f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"5ab6d3850ec1bb7d6ec33adf74d47904d25a97d950e30d0b06c585502754f70e\"" Sep 13 00:07:21.211205 env[1812]: time="2025-09-13T00:07:21.211096253Z" level=info msg="StartContainer for \"5ab6d3850ec1bb7d6ec33adf74d47904d25a97d950e30d0b06c585502754f70e\"" Sep 13 00:07:21.242378 systemd[1]: Started cri-containerd-5ab6d3850ec1bb7d6ec33adf74d47904d25a97d950e30d0b06c585502754f70e.scope. Sep 13 00:07:21.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.284000 audit: BPF prog-id=133 op=LOAD Sep 13 00:07:21.285000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.285000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3903 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:21.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623664333835306563316262376436656333336164663734643437 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3903 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:21.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623664333835306563316262376436656333336164663734643437 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.286000 audit: BPF prog-id=134 op=LOAD Sep 13 00:07:21.286000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3903 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:21.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623664333835306563316262376436656333336164663734643437 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.288000 audit: BPF prog-id=135 op=LOAD Sep 13 00:07:21.288000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3903 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:21.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623664333835306563316262376436656333336164663734643437 Sep 13 00:07:21.289000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:07:21.289000 audit: BPF prog-id=134 op=UNLOAD Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:21.289000 audit: BPF prog-id=136 op=LOAD Sep 13 00:07:21.289000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3903 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:21.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623664333835306563316262376436656333336164663734643437 Sep 13 00:07:21.322022 env[1812]: time="2025-09-13T00:07:21.321961448Z" level=info msg="StartContainer for \"5ab6d3850ec1bb7d6ec33adf74d47904d25a97d950e30d0b06c585502754f70e\" returns successfully" Sep 13 00:07:21.453789 kubelet[2203]: E0913 00:07:21.453715 2203 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:21.523468 kubelet[2203]: E0913 00:07:21.523386 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:22.022774 kubelet[2203]: I0913 00:07:22.022695 2203 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.670129149 podStartE2EDuration="36.022675728s" podCreationTimestamp="2025-09-13 00:06:46 +0000 UTC" firstStartedPulling="2025-09-13 00:07:20.800879193 +0000 UTC m=+80.634032687" lastFinishedPulling="2025-09-13 00:07:21.153425796 +0000 UTC m=+80.986579266" observedRunningTime="2025-09-13 00:07:22.021875808 +0000 UTC m=+81.855029290" watchObservedRunningTime="2025-09-13 00:07:22.022675728 +0000 UTC m=+81.855829222" Sep 13 00:07:22.457774 systemd-networkd[1534]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 00:07:22.524087 kubelet[2203]: E0913 00:07:22.524023 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:23.525173 kubelet[2203]: E0913 00:07:23.525078 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:24.526487 kubelet[2203]: E0913 00:07:24.526412 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:25.527305 kubelet[2203]: E0913 00:07:25.527261 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:26.528789 kubelet[2203]: E0913 00:07:26.528719 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:27.529490 kubelet[2203]: E0913 00:07:27.529426 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:28.530407 kubelet[2203]: E0913 00:07:28.530338 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:29.531434 kubelet[2203]: E0913 00:07:29.531390 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:30.253445 systemd[1]: run-containerd-runc-k8s.io-3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae-runc.u3ammS.mount: Deactivated successfully. Sep 13 00:07:30.533051 kubelet[2203]: E0913 00:07:30.532900 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:31.533236 kubelet[2203]: E0913 00:07:31.533197 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:32.534972 kubelet[2203]: E0913 00:07:32.534926 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:33.536181 kubelet[2203]: E0913 00:07:33.536120 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:34.536908 kubelet[2203]: E0913 00:07:34.536838 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:35.537279 kubelet[2203]: E0913 00:07:35.537232 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:36.538370 kubelet[2203]: E0913 00:07:36.538304 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:37.538812 kubelet[2203]: E0913 00:07:37.538745 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:38.539165 kubelet[2203]: E0913 00:07:38.539097 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:39.540099 kubelet[2203]: E0913 00:07:39.540028 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:40.540408 kubelet[2203]: E0913 00:07:40.540338 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:41.452976 kubelet[2203]: E0913 00:07:41.452909 2203 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:41.540821 kubelet[2203]: E0913 00:07:41.540753 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:42.540941 kubelet[2203]: E0913 00:07:42.540895 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:43.542141 kubelet[2203]: E0913 00:07:43.542076 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:43.560211 kubelet[2203]: E0913 00:07:43.560122 2203 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.41:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.136?timeout=10s\": context deadline exceeded" Sep 13 00:07:44.542441 kubelet[2203]: E0913 00:07:44.542376 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:45.542716 kubelet[2203]: E0913 00:07:45.542672 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:46.543998 kubelet[2203]: E0913 00:07:46.543925 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:47.545027 kubelet[2203]: E0913 00:07:47.544962 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:48.546001 kubelet[2203]: E0913 00:07:48.545930 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:49.546869 kubelet[2203]: E0913 00:07:49.546799 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:50.547938 kubelet[2203]: E0913 00:07:50.547869 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:51.548320 kubelet[2203]: E0913 00:07:51.548242 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:52.548856 kubelet[2203]: E0913 00:07:52.548779 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:53.549099 kubelet[2203]: E0913 00:07:53.549059 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:53.560658 kubelet[2203]: E0913 00:07:53.560600 2203 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.41:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.136?timeout=10s\": context deadline exceeded" Sep 13 00:07:54.550182 kubelet[2203]: E0913 00:07:54.550138 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:55.551268 kubelet[2203]: E0913 00:07:55.551227 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:56.552339 kubelet[2203]: E0913 00:07:56.552293 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:57.554096 kubelet[2203]: E0913 00:07:57.554023 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:58.554922 kubelet[2203]: E0913 00:07:58.554857 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:07:59.555210 kubelet[2203]: E0913 00:07:59.555138 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:08:00.249431 systemd[1]: run-containerd-runc-k8s.io-3e72b41959d7ea1a0c4ea85c9c86b6187ee8581a604c3bb77537d45e98220dae-runc.vNVYS5.mount: Deactivated successfully. Sep 13 00:08:00.555721 kubelet[2203]: E0913 00:08:00.555273 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:08:01.453399 kubelet[2203]: E0913 00:08:01.453354 2203 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:08:01.555915 kubelet[2203]: E0913 00:08:01.555845 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:08:02.556793 kubelet[2203]: E0913 00:08:02.556697 2203 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"