Sep 13 00:24:06.982231 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Sep 13 00:24:06.982268 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 12 23:05:37 -00 2025 Sep 13 00:24:06.982291 kernel: efi: EFI v2.70 by EDK II Sep 13 00:24:06.982306 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Sep 13 00:24:06.982320 kernel: ACPI: Early table checksum verification disabled Sep 13 00:24:06.982333 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Sep 13 00:24:06.982349 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Sep 13 00:24:06.982364 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Sep 13 00:24:06.982377 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Sep 13 00:24:06.982391 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Sep 13 00:24:06.982409 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Sep 13 00:24:06.982423 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Sep 13 00:24:06.982437 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Sep 13 00:24:06.982451 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Sep 13 00:24:06.982467 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Sep 13 00:24:06.982486 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Sep 13 00:24:06.982500 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Sep 13 00:24:06.982514 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Sep 13 00:24:06.982528 kernel: printk: bootconsole [uart0] enabled Sep 13 00:24:06.982542 kernel: NUMA: Failed to initialise from firmware Sep 13 00:24:06.982557 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Sep 13 00:24:06.982572 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Sep 13 00:24:06.982586 kernel: Zone ranges: Sep 13 00:24:06.982601 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Sep 13 00:24:06.982615 kernel: DMA32 empty Sep 13 00:24:06.982629 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Sep 13 00:24:06.982647 kernel: Movable zone start for each node Sep 13 00:24:06.982661 kernel: Early memory node ranges Sep 13 00:24:06.982676 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Sep 13 00:24:06.982690 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Sep 13 00:24:06.982704 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Sep 13 00:24:06.982718 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Sep 13 00:24:06.982733 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Sep 13 00:24:06.982747 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Sep 13 00:24:06.982761 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Sep 13 00:24:06.982775 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Sep 13 00:24:06.982789 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Sep 13 00:24:06.982803 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Sep 13 00:24:06.982822 kernel: psci: probing for conduit method from ACPI. Sep 13 00:24:06.982849 kernel: psci: PSCIv1.0 detected in firmware. Sep 13 00:24:06.982876 kernel: psci: Using standard PSCI v0.2 function IDs Sep 13 00:24:06.982893 kernel: psci: Trusted OS migration not required Sep 13 00:24:06.983031 kernel: psci: SMC Calling Convention v1.1 Sep 13 00:24:06.983056 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Sep 13 00:24:06.983071 kernel: ACPI: SRAT not present Sep 13 00:24:06.983087 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Sep 13 00:24:06.983102 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Sep 13 00:24:06.983118 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 13 00:24:06.983133 kernel: Detected PIPT I-cache on CPU0 Sep 13 00:24:06.983149 kernel: CPU features: detected: GIC system register CPU interface Sep 13 00:24:06.983164 kernel: CPU features: detected: Spectre-v2 Sep 13 00:24:06.983179 kernel: CPU features: detected: Spectre-v3a Sep 13 00:24:06.983201 kernel: CPU features: detected: Spectre-BHB Sep 13 00:24:06.983221 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 13 00:24:06.983242 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 13 00:24:06.983258 kernel: CPU features: detected: ARM erratum 1742098 Sep 13 00:24:06.983273 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Sep 13 00:24:06.983288 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Sep 13 00:24:06.983303 kernel: Policy zone: Normal Sep 13 00:24:06.983321 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 00:24:06.983337 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:24:06.983353 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:24:06.983368 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 00:24:06.983384 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:24:06.983403 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Sep 13 00:24:06.983419 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Sep 13 00:24:06.983435 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:24:06.983450 kernel: trace event string verifier disabled Sep 13 00:24:06.983465 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 13 00:24:06.983481 kernel: rcu: RCU event tracing is enabled. Sep 13 00:24:06.983497 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:24:06.983513 kernel: Trampoline variant of Tasks RCU enabled. Sep 13 00:24:06.983528 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:24:06.983544 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:24:06.983559 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:24:06.983574 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 13 00:24:06.983615 kernel: GICv3: 96 SPIs implemented Sep 13 00:24:06.983637 kernel: GICv3: 0 Extended SPIs implemented Sep 13 00:24:06.983653 kernel: GICv3: Distributor has no Range Selector support Sep 13 00:24:06.983668 kernel: Root IRQ handler: gic_handle_irq Sep 13 00:24:06.983683 kernel: GICv3: 16 PPIs implemented Sep 13 00:24:06.983698 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Sep 13 00:24:06.983713 kernel: ACPI: SRAT not present Sep 13 00:24:06.983728 kernel: ITS [mem 0x10080000-0x1009ffff] Sep 13 00:24:06.983743 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Sep 13 00:24:06.983759 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Sep 13 00:24:06.983774 kernel: GICv3: using LPI property table @0x00000004000b0000 Sep 13 00:24:06.983794 kernel: ITS: Using hypervisor restricted LPI range [128] Sep 13 00:24:06.983810 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Sep 13 00:24:06.983825 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Sep 13 00:24:06.983840 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Sep 13 00:24:06.983855 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Sep 13 00:24:06.983870 kernel: Console: colour dummy device 80x25 Sep 13 00:24:06.983886 kernel: printk: console [tty1] enabled Sep 13 00:24:06.983902 kernel: ACPI: Core revision 20210730 Sep 13 00:24:06.983918 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Sep 13 00:24:06.983934 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:24:06.983956 kernel: LSM: Security Framework initializing Sep 13 00:24:06.984016 kernel: SELinux: Initializing. Sep 13 00:24:06.984033 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 00:24:06.984049 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 00:24:06.984065 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:24:06.984080 kernel: Platform MSI: ITS@0x10080000 domain created Sep 13 00:24:06.984096 kernel: PCI/MSI: ITS@0x10080000 domain created Sep 13 00:24:06.984112 kernel: Remapping and enabling EFI services. Sep 13 00:24:06.984127 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:24:06.984143 kernel: Detected PIPT I-cache on CPU1 Sep 13 00:24:06.984165 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Sep 13 00:24:06.984180 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Sep 13 00:24:06.984196 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Sep 13 00:24:06.984211 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:24:06.984227 kernel: SMP: Total of 2 processors activated. Sep 13 00:24:06.984242 kernel: CPU features: detected: 32-bit EL0 Support Sep 13 00:24:06.984258 kernel: CPU features: detected: 32-bit EL1 Support Sep 13 00:24:06.984273 kernel: CPU features: detected: CRC32 instructions Sep 13 00:24:06.984288 kernel: CPU: All CPU(s) started at EL1 Sep 13 00:24:06.984308 kernel: alternatives: patching kernel code Sep 13 00:24:06.984324 kernel: devtmpfs: initialized Sep 13 00:24:06.984350 kernel: KASLR disabled due to lack of seed Sep 13 00:24:06.984370 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:24:06.984386 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:24:06.984402 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:24:06.984418 kernel: SMBIOS 3.0.0 present. Sep 13 00:24:06.984434 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Sep 13 00:24:06.984450 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:24:06.984466 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 13 00:24:06.984482 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 13 00:24:06.984503 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 13 00:24:06.984518 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:24:06.984535 kernel: audit: type=2000 audit(0.292:1): state=initialized audit_enabled=0 res=1 Sep 13 00:24:06.984551 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:24:06.984567 kernel: cpuidle: using governor menu Sep 13 00:24:06.984587 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 13 00:24:06.984603 kernel: ASID allocator initialised with 32768 entries Sep 13 00:24:06.984619 kernel: ACPI: bus type PCI registered Sep 13 00:24:06.984635 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:24:06.984651 kernel: Serial: AMBA PL011 UART driver Sep 13 00:24:06.984667 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:24:06.984683 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 13 00:24:06.984699 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:24:06.984735 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 13 00:24:06.984759 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:24:06.984776 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 13 00:24:06.984792 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:24:06.984808 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:24:06.984824 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:24:06.984840 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:24:06.984856 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:24:06.984872 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:24:06.984888 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:24:06.984904 kernel: ACPI: Interpreter enabled Sep 13 00:24:06.984924 kernel: ACPI: Using GIC for interrupt routing Sep 13 00:24:06.984940 kernel: ACPI: MCFG table detected, 1 entries Sep 13 00:24:06.984956 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Sep 13 00:24:06.985258 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 13 00:24:06.985455 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 13 00:24:06.985647 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 13 00:24:06.985838 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Sep 13 00:24:06.986063 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Sep 13 00:24:06.986088 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Sep 13 00:24:06.986104 kernel: acpiphp: Slot [1] registered Sep 13 00:24:06.986121 kernel: acpiphp: Slot [2] registered Sep 13 00:24:06.986137 kernel: acpiphp: Slot [3] registered Sep 13 00:24:06.986153 kernel: acpiphp: Slot [4] registered Sep 13 00:24:06.986169 kernel: acpiphp: Slot [5] registered Sep 13 00:24:06.986185 kernel: acpiphp: Slot [6] registered Sep 13 00:24:06.986201 kernel: acpiphp: Slot [7] registered Sep 13 00:24:06.986222 kernel: acpiphp: Slot [8] registered Sep 13 00:24:06.986238 kernel: acpiphp: Slot [9] registered Sep 13 00:24:06.986254 kernel: acpiphp: Slot [10] registered Sep 13 00:24:06.986270 kernel: acpiphp: Slot [11] registered Sep 13 00:24:06.986286 kernel: acpiphp: Slot [12] registered Sep 13 00:24:06.986302 kernel: acpiphp: Slot [13] registered Sep 13 00:24:06.986317 kernel: acpiphp: Slot [14] registered Sep 13 00:24:06.986333 kernel: acpiphp: Slot [15] registered Sep 13 00:24:06.986349 kernel: acpiphp: Slot [16] registered Sep 13 00:24:06.986369 kernel: acpiphp: Slot [17] registered Sep 13 00:24:06.986385 kernel: acpiphp: Slot [18] registered Sep 13 00:24:06.986401 kernel: acpiphp: Slot [19] registered Sep 13 00:24:06.986416 kernel: acpiphp: Slot [20] registered Sep 13 00:24:06.986432 kernel: acpiphp: Slot [21] registered Sep 13 00:24:06.986448 kernel: acpiphp: Slot [22] registered Sep 13 00:24:06.986464 kernel: acpiphp: Slot [23] registered Sep 13 00:24:06.986480 kernel: acpiphp: Slot [24] registered Sep 13 00:24:06.986495 kernel: acpiphp: Slot [25] registered Sep 13 00:24:06.986512 kernel: acpiphp: Slot [26] registered Sep 13 00:24:06.986532 kernel: acpiphp: Slot [27] registered Sep 13 00:24:06.986548 kernel: acpiphp: Slot [28] registered Sep 13 00:24:06.986564 kernel: acpiphp: Slot [29] registered Sep 13 00:24:06.986580 kernel: acpiphp: Slot [30] registered Sep 13 00:24:06.986595 kernel: acpiphp: Slot [31] registered Sep 13 00:24:06.986611 kernel: PCI host bridge to bus 0000:00 Sep 13 00:24:06.986804 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Sep 13 00:24:06.987089 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Sep 13 00:24:06.987279 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Sep 13 00:24:06.987459 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Sep 13 00:24:06.987685 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Sep 13 00:24:06.987901 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Sep 13 00:24:07.006559 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Sep 13 00:24:07.006795 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Sep 13 00:24:07.007037 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Sep 13 00:24:07.007237 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 00:24:07.007455 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Sep 13 00:24:07.007652 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Sep 13 00:24:07.007849 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Sep 13 00:24:07.008073 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Sep 13 00:24:07.008272 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 00:24:07.008472 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Sep 13 00:24:07.008667 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Sep 13 00:24:07.008894 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Sep 13 00:24:07.009115 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Sep 13 00:24:07.009323 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Sep 13 00:24:07.009510 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Sep 13 00:24:07.009691 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Sep 13 00:24:07.009877 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Sep 13 00:24:07.009899 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Sep 13 00:24:07.009917 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Sep 13 00:24:07.009933 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Sep 13 00:24:07.009950 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Sep 13 00:24:07.009995 kernel: iommu: Default domain type: Translated Sep 13 00:24:07.010015 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 13 00:24:07.010031 kernel: vgaarb: loaded Sep 13 00:24:07.010047 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:24:07.010069 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:24:07.010086 kernel: PTP clock support registered Sep 13 00:24:07.010102 kernel: Registered efivars operations Sep 13 00:24:07.010118 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 13 00:24:07.010134 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:24:07.010150 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:24:07.010166 kernel: pnp: PnP ACPI init Sep 13 00:24:07.010374 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Sep 13 00:24:07.010403 kernel: pnp: PnP ACPI: found 1 devices Sep 13 00:24:07.010420 kernel: NET: Registered PF_INET protocol family Sep 13 00:24:07.010437 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:24:07.010453 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 13 00:24:07.010470 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:24:07.010487 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 00:24:07.010503 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 13 00:24:07.010519 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 13 00:24:07.010535 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 00:24:07.010556 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 00:24:07.010573 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:24:07.010589 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:24:07.010605 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Sep 13 00:24:07.010622 kernel: kvm [1]: HYP mode not available Sep 13 00:24:07.010638 kernel: Initialise system trusted keyrings Sep 13 00:24:07.010655 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 13 00:24:07.010671 kernel: Key type asymmetric registered Sep 13 00:24:07.010687 kernel: Asymmetric key parser 'x509' registered Sep 13 00:24:07.010706 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:24:07.010723 kernel: io scheduler mq-deadline registered Sep 13 00:24:07.010739 kernel: io scheduler kyber registered Sep 13 00:24:07.010755 kernel: io scheduler bfq registered Sep 13 00:24:07.010949 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Sep 13 00:24:07.018019 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Sep 13 00:24:07.018046 kernel: ACPI: button: Power Button [PWRB] Sep 13 00:24:07.018063 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Sep 13 00:24:07.018080 kernel: ACPI: button: Sleep Button [SLPB] Sep 13 00:24:07.018108 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:24:07.018126 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Sep 13 00:24:07.018373 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Sep 13 00:24:07.018398 kernel: printk: console [ttyS0] disabled Sep 13 00:24:07.018416 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Sep 13 00:24:07.018433 kernel: printk: console [ttyS0] enabled Sep 13 00:24:07.018450 kernel: printk: bootconsole [uart0] disabled Sep 13 00:24:07.018466 kernel: thunder_xcv, ver 1.0 Sep 13 00:24:07.018482 kernel: thunder_bgx, ver 1.0 Sep 13 00:24:07.018504 kernel: nicpf, ver 1.0 Sep 13 00:24:07.018521 kernel: nicvf, ver 1.0 Sep 13 00:24:07.018726 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 13 00:24:07.020177 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-13T00:24:06 UTC (1757723046) Sep 13 00:24:07.020206 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:24:07.020224 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:24:07.020240 kernel: Segment Routing with IPv6 Sep 13 00:24:07.020257 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:24:07.020281 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:24:07.020297 kernel: Key type dns_resolver registered Sep 13 00:24:07.020314 kernel: registered taskstats version 1 Sep 13 00:24:07.020331 kernel: Loading compiled-in X.509 certificates Sep 13 00:24:07.020347 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 47ac98e9306f36eebe4291d409359a5a5d0c2b9c' Sep 13 00:24:07.020364 kernel: Key type .fscrypt registered Sep 13 00:24:07.020380 kernel: Key type fscrypt-provisioning registered Sep 13 00:24:07.020396 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:24:07.020412 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:24:07.020433 kernel: ima: No architecture policies found Sep 13 00:24:07.020449 kernel: clk: Disabling unused clocks Sep 13 00:24:07.020465 kernel: Freeing unused kernel memory: 36416K Sep 13 00:24:07.020481 kernel: Run /init as init process Sep 13 00:24:07.020497 kernel: with arguments: Sep 13 00:24:07.020513 kernel: /init Sep 13 00:24:07.020528 kernel: with environment: Sep 13 00:24:07.020544 kernel: HOME=/ Sep 13 00:24:07.020560 kernel: TERM=linux Sep 13 00:24:07.020580 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:24:07.020600 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:24:07.020621 systemd[1]: Detected virtualization amazon. Sep 13 00:24:07.020639 systemd[1]: Detected architecture arm64. Sep 13 00:24:07.020657 systemd[1]: Running in initrd. Sep 13 00:24:07.020674 systemd[1]: No hostname configured, using default hostname. Sep 13 00:24:07.020691 systemd[1]: Hostname set to . Sep 13 00:24:07.020730 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:24:07.020753 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:24:07.020771 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:24:07.020789 systemd[1]: Reached target cryptsetup.target. Sep 13 00:24:07.020807 systemd[1]: Reached target paths.target. Sep 13 00:24:07.020824 systemd[1]: Reached target slices.target. Sep 13 00:24:07.020842 systemd[1]: Reached target swap.target. Sep 13 00:24:07.020859 systemd[1]: Reached target timers.target. Sep 13 00:24:07.020882 systemd[1]: Listening on iscsid.socket. Sep 13 00:24:07.020900 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:24:07.020918 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:24:07.020935 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:24:07.020953 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:24:07.020991 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:24:07.021011 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:24:07.021029 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:24:07.021051 systemd[1]: Reached target sockets.target. Sep 13 00:24:07.021069 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:24:07.021087 systemd[1]: Finished network-cleanup.service. Sep 13 00:24:07.021104 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:24:07.021121 systemd[1]: Starting systemd-journald.service... Sep 13 00:24:07.021139 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:24:07.021156 systemd[1]: Starting systemd-resolved.service... Sep 13 00:24:07.021174 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:24:07.021192 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:24:07.021214 kernel: audit: type=1130 audit(1757723046.968:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.021232 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:24:07.021250 kernel: audit: type=1130 audit(1757723046.995:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.021267 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:24:07.021285 kernel: audit: type=1130 audit(1757723047.016:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.021306 systemd-journald[310]: Journal started Sep 13 00:24:07.021394 systemd-journald[310]: Runtime Journal (/run/log/journal/ec27ffcae078903c6b84170fbdbeefe2) is 8.0M, max 75.4M, 67.4M free. Sep 13 00:24:06.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:06.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:06.977909 systemd-modules-load[311]: Inserted module 'overlay' Sep 13 00:24:07.038614 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:24:07.038679 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:24:07.045066 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:24:07.068781 systemd[1]: Started systemd-journald.service. Sep 13 00:24:07.068843 kernel: audit: type=1130 audit(1757723047.062:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.075491 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:24:07.086952 kernel: audit: type=1130 audit(1757723047.073:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.088451 systemd-resolved[312]: Positive Trust Anchors: Sep 13 00:24:07.092919 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:24:07.097474 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:24:07.110608 kernel: Bridge firewalling registered Sep 13 00:24:07.101840 systemd-modules-load[311]: Inserted module 'br_netfilter' Sep 13 00:24:07.113887 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:24:07.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.125615 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:24:07.133417 kernel: audit: type=1130 audit(1757723047.112:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.148006 kernel: SCSI subsystem initialized Sep 13 00:24:07.158861 dracut-cmdline[328]: dracut-dracut-053 Sep 13 00:24:07.168002 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:24:07.168065 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:24:07.172905 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:24:07.174483 dracut-cmdline[328]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 00:24:07.195139 systemd-modules-load[311]: Inserted module 'dm_multipath' Sep 13 00:24:07.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.196532 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:24:07.213702 kernel: audit: type=1130 audit(1757723047.197:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.213010 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:24:07.231818 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:24:07.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.243073 kernel: audit: type=1130 audit(1757723047.232:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.343031 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:24:07.365064 kernel: iscsi: registered transport (tcp) Sep 13 00:24:07.392430 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:24:07.392512 kernel: QLogic iSCSI HBA Driver Sep 13 00:24:07.584749 systemd-resolved[312]: Defaulting to hostname 'linux'. Sep 13 00:24:07.589225 kernel: random: crng init done Sep 13 00:24:07.586642 systemd[1]: Started systemd-resolved.service. Sep 13 00:24:07.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.596116 systemd[1]: Reached target nss-lookup.target. Sep 13 00:24:07.605740 kernel: audit: type=1130 audit(1757723047.593:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.621415 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:24:07.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:07.626729 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:24:07.693010 kernel: raid6: neonx8 gen() 6354 MB/s Sep 13 00:24:07.710998 kernel: raid6: neonx8 xor() 4801 MB/s Sep 13 00:24:07.729005 kernel: raid6: neonx4 gen() 6458 MB/s Sep 13 00:24:07.746997 kernel: raid6: neonx4 xor() 4985 MB/s Sep 13 00:24:07.764997 kernel: raid6: neonx2 gen() 5764 MB/s Sep 13 00:24:07.782997 kernel: raid6: neonx2 xor() 4576 MB/s Sep 13 00:24:07.800997 kernel: raid6: neonx1 gen() 4434 MB/s Sep 13 00:24:07.818997 kernel: raid6: neonx1 xor() 3702 MB/s Sep 13 00:24:07.836997 kernel: raid6: int64x8 gen() 3405 MB/s Sep 13 00:24:07.854997 kernel: raid6: int64x8 xor() 2091 MB/s Sep 13 00:24:07.872996 kernel: raid6: int64x4 gen() 3791 MB/s Sep 13 00:24:07.890998 kernel: raid6: int64x4 xor() 2195 MB/s Sep 13 00:24:07.908996 kernel: raid6: int64x2 gen() 3587 MB/s Sep 13 00:24:07.926998 kernel: raid6: int64x2 xor() 1952 MB/s Sep 13 00:24:07.944997 kernel: raid6: int64x1 gen() 2761 MB/s Sep 13 00:24:07.964578 kernel: raid6: int64x1 xor() 1453 MB/s Sep 13 00:24:07.964607 kernel: raid6: using algorithm neonx4 gen() 6458 MB/s Sep 13 00:24:07.964631 kernel: raid6: .... xor() 4985 MB/s, rmw enabled Sep 13 00:24:07.966397 kernel: raid6: using neon recovery algorithm Sep 13 00:24:07.985003 kernel: xor: measuring software checksum speed Sep 13 00:24:07.985064 kernel: 8regs : 8550 MB/sec Sep 13 00:24:07.988565 kernel: 32regs : 11079 MB/sec Sep 13 00:24:07.990557 kernel: arm64_neon : 9156 MB/sec Sep 13 00:24:07.990586 kernel: xor: using function: 32regs (11079 MB/sec) Sep 13 00:24:08.089013 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 13 00:24:08.106150 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:24:08.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:08.110000 audit: BPF prog-id=7 op=LOAD Sep 13 00:24:08.110000 audit: BPF prog-id=8 op=LOAD Sep 13 00:24:08.115146 systemd[1]: Starting systemd-udevd.service... Sep 13 00:24:08.144248 systemd-udevd[509]: Using default interface naming scheme 'v252'. Sep 13 00:24:08.155263 systemd[1]: Started systemd-udevd.service. Sep 13 00:24:08.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:08.163748 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:24:08.192051 dracut-pre-trigger[520]: rd.md=0: removing MD RAID activation Sep 13 00:24:08.252312 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:24:08.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:08.261446 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:24:08.363473 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:24:08.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:08.492501 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Sep 13 00:24:08.492574 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Sep 13 00:24:08.514736 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Sep 13 00:24:08.514766 kernel: ena 0000:00:05.0: ENA device version: 0.10 Sep 13 00:24:08.515014 kernel: nvme nvme0: pci function 0000:00:04.0 Sep 13 00:24:08.515330 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Sep 13 00:24:08.515550 kernel: nvme nvme0: 2/0/0 default/read/poll queues Sep 13 00:24:08.515751 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:0f:b0:52:77:17 Sep 13 00:24:08.522945 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 13 00:24:08.523002 kernel: GPT:9289727 != 16777215 Sep 13 00:24:08.523028 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 13 00:24:08.525207 kernel: GPT:9289727 != 16777215 Sep 13 00:24:08.526477 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 13 00:24:08.529883 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:24:08.536433 (udev-worker)[562]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:24:08.608018 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (569) Sep 13 00:24:08.678879 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:24:08.722019 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:24:08.736007 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:24:08.748359 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:24:08.752521 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:24:08.768300 systemd[1]: Starting disk-uuid.service... Sep 13 00:24:08.779522 disk-uuid[671]: Primary Header is updated. Sep 13 00:24:08.779522 disk-uuid[671]: Secondary Entries is updated. Sep 13 00:24:08.779522 disk-uuid[671]: Secondary Header is updated. Sep 13 00:24:08.790013 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:24:08.800001 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:24:08.808988 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:24:09.809369 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:24:09.809449 disk-uuid[672]: The operation has completed successfully. Sep 13 00:24:09.966780 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:24:09.969224 systemd[1]: Finished disk-uuid.service. Sep 13 00:24:09.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:09.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.000775 systemd[1]: Starting verity-setup.service... Sep 13 00:24:10.038008 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 13 00:24:10.133065 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:24:10.137806 systemd[1]: Finished verity-setup.service. Sep 13 00:24:10.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.142594 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:24:10.237010 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:24:10.238413 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:24:10.238750 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:24:10.240007 systemd[1]: Starting ignition-setup.service... Sep 13 00:24:10.258467 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:24:10.280243 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:24:10.280314 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:24:10.280339 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:24:10.316042 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:24:10.334207 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:24:10.364280 systemd[1]: Finished ignition-setup.service. Sep 13 00:24:10.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.367554 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:24:10.415796 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:24:10.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.418000 audit: BPF prog-id=9 op=LOAD Sep 13 00:24:10.421666 systemd[1]: Starting systemd-networkd.service... Sep 13 00:24:10.470752 systemd-networkd[1195]: lo: Link UP Sep 13 00:24:10.470775 systemd-networkd[1195]: lo: Gained carrier Sep 13 00:24:10.473275 systemd-networkd[1195]: Enumeration completed Sep 13 00:24:10.473726 systemd-networkd[1195]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:24:10.474595 systemd[1]: Started systemd-networkd.service. Sep 13 00:24:10.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.482751 systemd[1]: Reached target network.target. Sep 13 00:24:10.487068 systemd-networkd[1195]: eth0: Link UP Sep 13 00:24:10.487264 systemd-networkd[1195]: eth0: Gained carrier Sep 13 00:24:10.487306 systemd[1]: Starting iscsiuio.service... Sep 13 00:24:10.506597 systemd[1]: Started iscsiuio.service. Sep 13 00:24:10.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.511031 systemd[1]: Starting iscsid.service... Sep 13 00:24:10.516917 systemd-networkd[1195]: eth0: DHCPv4 address 172.31.31.159/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:24:10.525029 iscsid[1200]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:24:10.525029 iscsid[1200]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 13 00:24:10.525029 iscsid[1200]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:24:10.525029 iscsid[1200]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:24:10.525029 iscsid[1200]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:24:10.525029 iscsid[1200]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:24:10.525029 iscsid[1200]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:24:10.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.543328 systemd[1]: Started iscsid.service. Sep 13 00:24:10.555143 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:24:10.575922 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:24:10.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:10.580210 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:24:10.582095 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:24:10.584076 systemd[1]: Reached target remote-fs.target. Sep 13 00:24:10.587283 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:24:10.607228 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:24:10.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.152038 ignition[1162]: Ignition 2.14.0 Sep 13 00:24:11.153734 ignition[1162]: Stage: fetch-offline Sep 13 00:24:11.154297 ignition[1162]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:24:11.154359 ignition[1162]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:24:11.183539 ignition[1162]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:24:11.184232 ignition[1162]: Ignition finished successfully Sep 13 00:24:11.190638 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:24:11.205279 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 13 00:24:11.205662 kernel: audit: type=1130 audit(1757723051.191:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.197096 systemd[1]: Starting ignition-fetch.service... Sep 13 00:24:11.215733 ignition[1219]: Ignition 2.14.0 Sep 13 00:24:11.215761 ignition[1219]: Stage: fetch Sep 13 00:24:11.216082 ignition[1219]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:24:11.216141 ignition[1219]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:24:11.232766 ignition[1219]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:24:11.235297 ignition[1219]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:24:11.245498 ignition[1219]: INFO : PUT result: OK Sep 13 00:24:11.248918 ignition[1219]: DEBUG : parsed url from cmdline: "" Sep 13 00:24:11.248918 ignition[1219]: INFO : no config URL provided Sep 13 00:24:11.248918 ignition[1219]: INFO : reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:24:11.255364 ignition[1219]: INFO : no config at "/usr/lib/ignition/user.ign" Sep 13 00:24:11.255364 ignition[1219]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:24:11.255364 ignition[1219]: INFO : PUT result: OK Sep 13 00:24:11.255364 ignition[1219]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Sep 13 00:24:11.264115 ignition[1219]: INFO : GET result: OK Sep 13 00:24:11.264115 ignition[1219]: DEBUG : parsing config with SHA512: d87b0334526c6af2bcddc7a211a653ce877ebe8de9759860b4767cd52eed49cf1c91249d6a1d17f2f0d4a6d4f70e76ef397858d2e1f3e5bacdc48481fc663d9d Sep 13 00:24:11.271942 unknown[1219]: fetched base config from "system" Sep 13 00:24:11.271991 unknown[1219]: fetched base config from "system" Sep 13 00:24:11.272038 unknown[1219]: fetched user config from "aws" Sep 13 00:24:11.277622 ignition[1219]: fetch: fetch complete Sep 13 00:24:11.277647 ignition[1219]: fetch: fetch passed Sep 13 00:24:11.280557 ignition[1219]: Ignition finished successfully Sep 13 00:24:11.284597 systemd[1]: Finished ignition-fetch.service. Sep 13 00:24:11.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.289367 systemd[1]: Starting ignition-kargs.service... Sep 13 00:24:11.299449 kernel: audit: type=1130 audit(1757723051.286:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.311960 ignition[1225]: Ignition 2.14.0 Sep 13 00:24:11.312004 ignition[1225]: Stage: kargs Sep 13 00:24:11.312293 ignition[1225]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:24:11.312346 ignition[1225]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:24:11.327350 ignition[1225]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:24:11.329936 ignition[1225]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:24:11.333293 ignition[1225]: INFO : PUT result: OK Sep 13 00:24:11.339216 ignition[1225]: kargs: kargs passed Sep 13 00:24:11.339304 ignition[1225]: Ignition finished successfully Sep 13 00:24:11.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.341930 systemd[1]: Finished ignition-kargs.service. Sep 13 00:24:11.355027 kernel: audit: type=1130 audit(1757723051.342:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.353462 systemd[1]: Starting ignition-disks.service... Sep 13 00:24:11.370410 ignition[1231]: Ignition 2.14.0 Sep 13 00:24:11.370438 ignition[1231]: Stage: disks Sep 13 00:24:11.370729 ignition[1231]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:24:11.370782 ignition[1231]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:24:11.385570 ignition[1231]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:24:11.388137 ignition[1231]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:24:11.394727 ignition[1231]: INFO : PUT result: OK Sep 13 00:24:11.399306 ignition[1231]: disks: disks passed Sep 13 00:24:11.399586 ignition[1231]: Ignition finished successfully Sep 13 00:24:11.406082 systemd[1]: Finished ignition-disks.service. Sep 13 00:24:11.431932 kernel: audit: type=1130 audit(1757723051.404:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.406433 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:24:11.407120 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:24:11.407902 systemd[1]: Reached target local-fs.target. Sep 13 00:24:11.408734 systemd[1]: Reached target sysinit.target. Sep 13 00:24:11.418247 systemd[1]: Reached target basic.target. Sep 13 00:24:11.420529 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:24:11.469881 systemd-fsck[1239]: ROOT: clean, 629/553520 files, 56027/553472 blocks Sep 13 00:24:11.475196 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:24:11.492928 kernel: audit: type=1130 audit(1757723051.477:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.485687 systemd[1]: Mounting sysroot.mount... Sep 13 00:24:11.514042 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:24:11.514792 systemd[1]: Mounted sysroot.mount. Sep 13 00:24:11.515136 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:24:11.521440 systemd-networkd[1195]: eth0: Gained IPv6LL Sep 13 00:24:11.534464 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:24:11.540658 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 13 00:24:11.540751 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:24:11.540808 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:24:11.548372 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:24:11.578489 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:24:11.587555 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:24:11.609473 initrd-setup-root[1261]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:24:11.614027 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1256) Sep 13 00:24:11.619984 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:24:11.620037 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:24:11.620061 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:24:11.626200 initrd-setup-root[1278]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:24:11.645540 initrd-setup-root[1293]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:24:11.652865 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:24:11.659711 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:24:11.667634 initrd-setup-root[1303]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:24:11.948424 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:24:11.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.953240 systemd[1]: Starting ignition-mount.service... Sep 13 00:24:11.967706 kernel: audit: type=1130 audit(1757723051.950:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:11.962822 systemd[1]: Starting sysroot-boot.service... Sep 13 00:24:11.975804 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:24:11.976002 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:24:12.015822 ignition[1323]: INFO : Ignition 2.14.0 Sep 13 00:24:12.015822 ignition[1323]: INFO : Stage: mount Sep 13 00:24:12.015822 ignition[1323]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:24:12.015822 ignition[1323]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:24:12.020802 systemd[1]: Finished sysroot-boot.service. Sep 13 00:24:12.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:12.039006 kernel: audit: type=1130 audit(1757723052.029:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:12.042433 ignition[1323]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:24:12.045169 ignition[1323]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:24:12.047813 ignition[1323]: INFO : PUT result: OK Sep 13 00:24:12.052123 ignition[1323]: INFO : mount: mount passed Sep 13 00:24:12.054389 ignition[1323]: INFO : Ignition finished successfully Sep 13 00:24:12.054248 systemd[1]: Finished ignition-mount.service. Sep 13 00:24:12.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:12.061070 systemd[1]: Starting ignition-files.service... Sep 13 00:24:12.076617 kernel: audit: type=1130 audit(1757723052.058:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:12.075157 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:24:12.100006 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1331) Sep 13 00:24:12.106153 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:24:12.106195 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:24:12.106219 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:24:12.120999 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:24:12.126184 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:24:12.142236 ignition[1350]: INFO : Ignition 2.14.0 Sep 13 00:24:12.142236 ignition[1350]: INFO : Stage: files Sep 13 00:24:12.149823 ignition[1350]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:24:12.149823 ignition[1350]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:24:12.166202 ignition[1350]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:24:12.174676 ignition[1350]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:24:12.174676 ignition[1350]: INFO : PUT result: OK Sep 13 00:24:12.182247 ignition[1350]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:24:12.186996 ignition[1350]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:24:12.186996 ignition[1350]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:24:12.218155 ignition[1350]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:24:12.221321 ignition[1350]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:24:12.225684 unknown[1350]: wrote ssh authorized keys file for user: core Sep 13 00:24:12.228083 ignition[1350]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:24:12.231945 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:24:12.235732 ignition[1350]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:24:12.246565 ignition[1350]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3422311918" Sep 13 00:24:12.249961 ignition[1350]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3422311918": device or resource busy Sep 13 00:24:12.249961 ignition[1350]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3422311918", trying btrfs: device or resource busy Sep 13 00:24:12.249961 ignition[1350]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3422311918" Sep 13 00:24:12.249961 ignition[1350]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3422311918" Sep 13 00:24:12.263751 ignition[1350]: INFO : op(3): [started] unmounting "/mnt/oem3422311918" Sep 13 00:24:12.263751 ignition[1350]: INFO : op(3): [finished] unmounting "/mnt/oem3422311918" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 00:24:12.268787 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:24:12.268787 ignition[1350]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:24:12.310331 ignition[1350]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem382968383" Sep 13 00:24:12.310331 ignition[1350]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem382968383": device or resource busy Sep 13 00:24:12.310331 ignition[1350]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem382968383", trying btrfs: device or resource busy Sep 13 00:24:12.310331 ignition[1350]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem382968383" Sep 13 00:24:12.310331 ignition[1350]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem382968383" Sep 13 00:24:12.328777 ignition[1350]: INFO : op(6): [started] unmounting "/mnt/oem382968383" Sep 13 00:24:12.328777 ignition[1350]: INFO : op(6): [finished] unmounting "/mnt/oem382968383" Sep 13 00:24:12.328777 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:24:12.328777 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:24:12.328777 ignition[1350]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:24:12.352133 ignition[1350]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2413218098" Sep 13 00:24:12.355229 ignition[1350]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2413218098": device or resource busy Sep 13 00:24:12.355229 ignition[1350]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2413218098", trying btrfs: device or resource busy Sep 13 00:24:12.355229 ignition[1350]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2413218098" Sep 13 00:24:12.365536 ignition[1350]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2413218098" Sep 13 00:24:12.365536 ignition[1350]: INFO : op(9): [started] unmounting "/mnt/oem2413218098" Sep 13 00:24:12.370748 ignition[1350]: INFO : op(9): [finished] unmounting "/mnt/oem2413218098" Sep 13 00:24:12.373077 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:24:12.377342 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:24:12.381406 ignition[1350]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:24:12.395742 ignition[1350]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3443283125" Sep 13 00:24:12.398988 ignition[1350]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3443283125": device or resource busy Sep 13 00:24:12.398988 ignition[1350]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3443283125", trying btrfs: device or resource busy Sep 13 00:24:12.398988 ignition[1350]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3443283125" Sep 13 00:24:12.398988 ignition[1350]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3443283125" Sep 13 00:24:12.412396 ignition[1350]: INFO : op(c): [started] unmounting "/mnt/oem3443283125" Sep 13 00:24:12.412396 ignition[1350]: INFO : op(c): [finished] unmounting "/mnt/oem3443283125" Sep 13 00:24:12.417259 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:24:12.417259 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 00:24:12.417259 ignition[1350]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 Sep 13 00:24:12.926389 ignition[1350]: INFO : GET result: OK Sep 13 00:24:13.554086 ignition[1350]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 00:24:13.554086 ignition[1350]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(e): [started] processing unit "nvidia.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(e): [finished] processing unit "nvidia.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(f): [started] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(f): [finished] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(10): [started] setting preset to enabled for "nvidia.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(10): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:24:13.563067 ignition[1350]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:24:13.605611 ignition[1350]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:24:13.605611 ignition[1350]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:24:13.605611 ignition[1350]: INFO : files: files passed Sep 13 00:24:13.605611 ignition[1350]: INFO : Ignition finished successfully Sep 13 00:24:13.617954 systemd[1]: Finished ignition-files.service. Sep 13 00:24:13.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.630141 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:24:13.634584 kernel: audit: type=1130 audit(1757723053.618:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.636808 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:24:13.638360 systemd[1]: Starting ignition-quench.service... Sep 13 00:24:13.648853 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:24:13.649085 systemd[1]: Finished ignition-quench.service. Sep 13 00:24:13.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.661994 kernel: audit: type=1130 audit(1757723053.649:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.667991 initrd-setup-root-after-ignition[1375]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:24:13.672597 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:24:13.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.674890 systemd[1]: Reached target ignition-complete.target. Sep 13 00:24:13.678107 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:24:13.707529 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:24:13.709902 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:24:13.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.713659 systemd[1]: Reached target initrd-fs.target. Sep 13 00:24:13.715486 systemd[1]: Reached target initrd.target. Sep 13 00:24:13.720060 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:24:13.724290 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:24:13.745568 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:24:13.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.750539 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:24:13.770584 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:24:13.774544 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:24:13.778475 systemd[1]: Stopped target timers.target. Sep 13 00:24:13.781819 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:24:13.784132 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:24:13.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.787955 systemd[1]: Stopped target initrd.target. Sep 13 00:24:13.791290 systemd[1]: Stopped target basic.target. Sep 13 00:24:13.794646 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:24:13.798309 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:24:13.805089 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:24:13.808820 systemd[1]: Stopped target remote-fs.target. Sep 13 00:24:13.812178 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:24:13.815722 systemd[1]: Stopped target sysinit.target. Sep 13 00:24:13.819037 systemd[1]: Stopped target local-fs.target. Sep 13 00:24:13.822352 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:24:13.825924 systemd[1]: Stopped target swap.target. Sep 13 00:24:13.828921 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:24:13.831045 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:24:13.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.834561 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:24:13.841819 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:24:13.844001 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:24:13.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.847483 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:24:13.850004 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:24:13.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.858353 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:24:13.860441 systemd[1]: Stopped ignition-files.service. Sep 13 00:24:13.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.865416 systemd[1]: Stopping ignition-mount.service... Sep 13 00:24:13.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.870522 systemd[1]: Stopping iscsiuio.service... Sep 13 00:24:13.873827 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:24:13.881742 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:24:13.883126 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:24:13.885712 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:24:13.887364 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:24:13.904793 ignition[1388]: INFO : Ignition 2.14.0 Sep 13 00:24:13.904793 ignition[1388]: INFO : Stage: umount Sep 13 00:24:13.912591 ignition[1388]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:24:13.912591 ignition[1388]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:24:13.906232 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:24:13.906483 systemd[1]: Stopped iscsiuio.service. Sep 13 00:24:13.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.934076 ignition[1388]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:24:13.934076 ignition[1388]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:24:13.933864 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:24:13.936595 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:24:13.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.950469 ignition[1388]: INFO : PUT result: OK Sep 13 00:24:13.950469 ignition[1388]: INFO : umount: umount passed Sep 13 00:24:13.950469 ignition[1388]: INFO : Ignition finished successfully Sep 13 00:24:13.947273 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:24:13.959181 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:24:13.960753 systemd[1]: Stopped ignition-mount.service. Sep 13 00:24:13.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.965184 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:24:13.965667 systemd[1]: Stopped ignition-disks.service. Sep 13 00:24:13.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.970789 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:24:13.971077 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:24:13.976196 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:24:13.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.976289 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:24:13.983367 systemd[1]: Stopped target network.target. Sep 13 00:24:13.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.985123 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:24:13.988821 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:24:13.992474 systemd[1]: Stopped target paths.target. Sep 13 00:24:13.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:13.992589 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:24:13.999041 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:24:14.002609 systemd[1]: Stopped target slices.target. Sep 13 00:24:14.004302 systemd[1]: Stopped target sockets.target. Sep 13 00:24:14.007349 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:24:14.008808 systemd[1]: Closed iscsid.socket. Sep 13 00:24:14.010341 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:24:14.012072 systemd[1]: Closed iscsiuio.socket. Sep 13 00:24:14.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.014733 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:24:14.014818 systemd[1]: Stopped ignition-setup.service. Sep 13 00:24:14.021861 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:24:14.026531 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:24:14.030018 systemd-networkd[1195]: eth0: DHCPv6 lease lost Sep 13 00:24:14.034720 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:24:14.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.034914 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:24:14.037837 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:24:14.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.043000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:24:14.043000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:24:14.038054 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:24:14.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.041843 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:24:14.042041 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:24:14.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.044549 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:24:14.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.044617 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:24:14.046430 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:24:14.046514 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:24:14.052286 systemd[1]: Stopping network-cleanup.service... Sep 13 00:24:14.057063 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:24:14.057303 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:24:14.062333 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:24:14.062425 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:24:14.066177 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:24:14.066263 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:24:14.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.084208 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:24:14.094769 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:24:14.102939 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:24:14.103188 systemd[1]: Stopped network-cleanup.service. Sep 13 00:24:14.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.109481 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:24:14.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.109767 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:24:14.115236 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:24:14.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.115353 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:24:14.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.119199 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:24:14.119270 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:24:14.121104 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:24:14.121185 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:24:14.123057 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:24:14.123137 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:24:14.125824 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:24:14.125901 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:24:14.127493 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:24:14.127656 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 13 00:24:14.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.127756 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 13 00:24:14.136926 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:24:14.137064 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:24:14.163869 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:24:14.165992 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:24:14.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.174542 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 13 00:24:14.178420 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:24:14.180776 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:24:14.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:14.184850 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:24:14.189886 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:24:14.206238 systemd[1]: Switching root. Sep 13 00:24:14.231231 iscsid[1200]: iscsid shutting down. Sep 13 00:24:14.234804 systemd-journald[310]: Received SIGTERM from PID 1 (systemd). Sep 13 00:24:14.234885 systemd-journald[310]: Journal stopped Sep 13 00:24:20.476675 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:24:20.476818 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:24:20.476852 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:24:20.476889 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:24:20.476917 kernel: SELinux: policy capability open_perms=1 Sep 13 00:24:20.476955 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:24:20.479103 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:24:20.479143 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:24:20.479176 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:24:20.479206 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:24:20.479236 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:24:20.479279 systemd[1]: Successfully loaded SELinux policy in 136.878ms. Sep 13 00:24:20.479339 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.309ms. Sep 13 00:24:20.479375 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:24:20.479413 systemd[1]: Detected virtualization amazon. Sep 13 00:24:20.479451 systemd[1]: Detected architecture arm64. Sep 13 00:24:20.479481 systemd[1]: Detected first boot. Sep 13 00:24:20.479512 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:24:20.479544 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:24:20.479574 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:24:20.479607 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:24:20.479647 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:24:20.479683 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:24:20.479718 kernel: kauditd_printk_skb: 56 callbacks suppressed Sep 13 00:24:20.479748 kernel: audit: type=1334 audit(1757723059.975:88): prog-id=12 op=LOAD Sep 13 00:24:20.479776 kernel: audit: type=1334 audit(1757723059.977:89): prog-id=3 op=UNLOAD Sep 13 00:24:20.479806 kernel: audit: type=1334 audit(1757723059.980:90): prog-id=13 op=LOAD Sep 13 00:24:20.479837 kernel: audit: type=1334 audit(1757723059.982:91): prog-id=14 op=LOAD Sep 13 00:24:20.479873 kernel: audit: type=1334 audit(1757723059.982:92): prog-id=4 op=UNLOAD Sep 13 00:24:20.479904 kernel: audit: type=1334 audit(1757723059.982:93): prog-id=5 op=UNLOAD Sep 13 00:24:20.479933 kernel: audit: type=1334 audit(1757723059.987:94): prog-id=15 op=LOAD Sep 13 00:24:20.479992 kernel: audit: type=1334 audit(1757723059.987:95): prog-id=12 op=UNLOAD Sep 13 00:24:20.480029 kernel: audit: type=1334 audit(1757723059.990:96): prog-id=16 op=LOAD Sep 13 00:24:20.480059 kernel: audit: type=1334 audit(1757723059.992:97): prog-id=17 op=LOAD Sep 13 00:24:20.480092 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:24:20.480122 systemd[1]: Stopped iscsid.service. Sep 13 00:24:20.480155 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:24:20.480190 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:24:20.480220 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:24:20.480254 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:24:20.480295 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:24:20.480328 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 13 00:24:20.480360 systemd[1]: Created slice system-getty.slice. Sep 13 00:24:20.480390 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:24:20.480424 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:24:20.480459 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:24:20.480493 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:24:20.480526 systemd[1]: Created slice user.slice. Sep 13 00:24:20.480559 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:24:20.480589 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:24:20.480640 systemd[1]: Set up automount boot.automount. Sep 13 00:24:20.480675 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:24:20.480705 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:24:20.480735 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:24:20.480769 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:24:20.480798 systemd[1]: Reached target integritysetup.target. Sep 13 00:24:20.480830 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:24:20.480862 systemd[1]: Reached target remote-fs.target. Sep 13 00:24:20.480892 systemd[1]: Reached target slices.target. Sep 13 00:24:20.480922 systemd[1]: Reached target swap.target. Sep 13 00:24:20.480952 systemd[1]: Reached target torcx.target. Sep 13 00:24:20.489633 systemd[1]: Reached target veritysetup.target. Sep 13 00:24:20.489679 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:24:20.489716 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:24:20.489750 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:24:20.489781 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:24:20.489812 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:24:20.489842 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:24:20.489871 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:24:20.489900 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:24:20.489930 systemd[1]: Mounting media.mount... Sep 13 00:24:20.489961 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:24:20.490021 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:24:20.490057 systemd[1]: Mounting tmp.mount... Sep 13 00:24:20.490090 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:24:20.490123 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:24:20.490154 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:24:20.490186 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:24:20.490218 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:24:20.490248 systemd[1]: Starting modprobe@drm.service... Sep 13 00:24:20.490281 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:24:20.490312 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:24:20.490347 systemd[1]: Starting modprobe@loop.service... Sep 13 00:24:20.490381 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:24:20.490415 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:24:20.490446 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:24:20.490477 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:24:20.490507 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:24:20.490537 systemd[1]: Stopped systemd-journald.service. Sep 13 00:24:20.490568 systemd[1]: Starting systemd-journald.service... Sep 13 00:24:20.490597 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:24:20.490631 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:24:20.490661 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:24:20.490692 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:24:20.490726 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:24:20.490767 systemd[1]: Stopped verity-setup.service. Sep 13 00:24:20.490797 kernel: loop: module loaded Sep 13 00:24:20.490826 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:24:20.490856 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:24:20.490885 systemd[1]: Mounted media.mount. Sep 13 00:24:20.490920 kernel: fuse: init (API version 7.34) Sep 13 00:24:20.490950 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:24:20.491007 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:24:20.491040 systemd[1]: Mounted tmp.mount. Sep 13 00:24:20.491070 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:24:20.491101 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:24:20.491132 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:24:20.491163 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:24:20.491200 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:24:20.491231 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:24:20.491264 systemd[1]: Finished modprobe@drm.service. Sep 13 00:24:20.491294 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:24:20.491324 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:24:20.491353 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:24:20.491386 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:24:20.491417 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:24:20.491446 systemd[1]: Finished modprobe@loop.service. Sep 13 00:24:20.491476 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:24:20.491508 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:24:20.491542 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:24:20.491571 systemd[1]: Reached target network-pre.target. Sep 13 00:24:20.491601 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:24:20.491631 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:24:20.491662 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:24:20.491696 systemd-journald[1499]: Journal started Sep 13 00:24:20.491801 systemd-journald[1499]: Runtime Journal (/run/log/journal/ec27ffcae078903c6b84170fbdbeefe2) is 8.0M, max 75.4M, 67.4M free. Sep 13 00:24:15.268000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:24:15.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:24:15.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:24:15.473000 audit: BPF prog-id=10 op=LOAD Sep 13 00:24:15.473000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:24:15.473000 audit: BPF prog-id=11 op=LOAD Sep 13 00:24:15.473000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:24:15.707000 audit[1421]: AVC avc: denied { associate } for pid=1421 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:24:15.707000 audit[1421]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1404 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:15.707000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:24:15.711000 audit[1421]: AVC avc: denied { associate } for pid=1421 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:24:15.711000 audit[1421]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1404 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:15.711000 audit: CWD cwd="/" Sep 13 00:24:15.711000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:24:15.711000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:24:15.711000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:24:19.975000 audit: BPF prog-id=12 op=LOAD Sep 13 00:24:19.977000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:24:19.980000 audit: BPF prog-id=13 op=LOAD Sep 13 00:24:19.982000 audit: BPF prog-id=14 op=LOAD Sep 13 00:24:19.982000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:24:19.982000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:24:19.987000 audit: BPF prog-id=15 op=LOAD Sep 13 00:24:19.987000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:24:19.990000 audit: BPF prog-id=16 op=LOAD Sep 13 00:24:19.992000 audit: BPF prog-id=17 op=LOAD Sep 13 00:24:19.992000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:24:19.992000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:24:19.995000 audit: BPF prog-id=18 op=LOAD Sep 13 00:24:20.506422 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:24:20.506514 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:24:19.995000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:24:19.997000 audit: BPF prog-id=19 op=LOAD Sep 13 00:24:20.000000 audit: BPF prog-id=20 op=LOAD Sep 13 00:24:20.000000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:24:20.000000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:24:20.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.008000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:24:20.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.292000 audit: BPF prog-id=21 op=LOAD Sep 13 00:24:20.293000 audit: BPF prog-id=22 op=LOAD Sep 13 00:24:20.293000 audit: BPF prog-id=23 op=LOAD Sep 13 00:24:20.293000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:24:20.293000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:24:20.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.432000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:24:20.432000 audit[1499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffc6171680 a2=4000 a3=1 items=0 ppid=1 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:20.432000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:24:20.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:15.695989 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:24:19.973709 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:24:15.697386 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:24:19.973729 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Sep 13 00:24:15.697437 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:24:20.002847 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:24:15.697501 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:24:15.697527 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:24:20.523761 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:24:20.523837 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:24:15.697586 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:24:15.697616 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:24:15.698046 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:24:15.698123 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:24:15.698158 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:24:20.553790 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:24:20.553887 systemd[1]: Started systemd-journald.service. Sep 13 00:24:20.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:15.707025 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:24:20.542168 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:24:15.707296 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:24:20.544354 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:24:15.707345 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:24:15.707386 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:24:15.707435 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:24:15.707474 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:24:19.103455 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:24:19.104020 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:24:19.104255 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:24:19.104729 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:24:19.104838 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:24:19.104999 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-09-13T00:24:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:24:20.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.562810 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:24:20.566473 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:24:20.569195 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:24:20.583656 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:24:20.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.587869 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:24:20.599916 systemd-journald[1499]: Time spent on flushing to /var/log/journal/ec27ffcae078903c6b84170fbdbeefe2 is 55.110ms for 1133 entries. Sep 13 00:24:20.599916 systemd-journald[1499]: System Journal (/var/log/journal/ec27ffcae078903c6b84170fbdbeefe2) is 8.0M, max 195.6M, 187.6M free. Sep 13 00:24:20.676518 systemd-journald[1499]: Received client request to flush runtime journal. Sep 13 00:24:20.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.610296 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:24:20.676588 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:24:20.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.680852 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:24:20.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.685764 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:24:20.697272 udevadm[1540]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 13 00:24:20.804177 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:24:20.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:20.808322 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:24:20.951647 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:24:20.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:21.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:21.412000 audit: BPF prog-id=24 op=LOAD Sep 13 00:24:21.412000 audit: BPF prog-id=25 op=LOAD Sep 13 00:24:21.412000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:24:21.412000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:24:21.410297 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:24:21.414669 systemd[1]: Starting systemd-udevd.service... Sep 13 00:24:21.457258 systemd-udevd[1543]: Using default interface naming scheme 'v252'. Sep 13 00:24:21.511743 systemd[1]: Started systemd-udevd.service. Sep 13 00:24:21.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:21.519000 audit: BPF prog-id=26 op=LOAD Sep 13 00:24:21.522066 systemd[1]: Starting systemd-networkd.service... Sep 13 00:24:21.531000 audit: BPF prog-id=27 op=LOAD Sep 13 00:24:21.532000 audit: BPF prog-id=28 op=LOAD Sep 13 00:24:21.532000 audit: BPF prog-id=29 op=LOAD Sep 13 00:24:21.534537 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:24:21.579861 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:24:21.617154 (udev-worker)[1544]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:24:21.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:21.684018 systemd[1]: Started systemd-userdbd.service. Sep 13 00:24:21.868225 systemd-networkd[1552]: lo: Link UP Sep 13 00:24:21.868250 systemd-networkd[1552]: lo: Gained carrier Sep 13 00:24:21.869309 systemd-networkd[1552]: Enumeration completed Sep 13 00:24:21.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:21.869531 systemd[1]: Started systemd-networkd.service. Sep 13 00:24:21.869556 systemd-networkd[1552]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:24:21.879094 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:24:21.885026 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:24:21.885352 systemd-networkd[1552]: eth0: Link UP Sep 13 00:24:21.885672 systemd-networkd[1552]: eth0: Gained carrier Sep 13 00:24:21.903220 systemd-networkd[1552]: eth0: DHCPv4 address 172.31.31.159/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:24:22.004403 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:24:22.013638 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:24:22.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.017906 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:24:22.078755 lvm[1662]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:24:22.112368 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:24:22.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.114564 systemd[1]: Reached target cryptsetup.target. Sep 13 00:24:22.118534 systemd[1]: Starting lvm2-activation.service... Sep 13 00:24:22.126817 lvm[1663]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:24:22.163498 systemd[1]: Finished lvm2-activation.service. Sep 13 00:24:22.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.165636 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:24:22.167749 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:24:22.167903 systemd[1]: Reached target local-fs.target. Sep 13 00:24:22.169828 systemd[1]: Reached target machines.target. Sep 13 00:24:22.174108 systemd[1]: Starting ldconfig.service... Sep 13 00:24:22.177211 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:24:22.177488 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:24:22.179918 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:24:22.184279 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:24:22.189841 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:24:22.200846 systemd[1]: Starting systemd-sysext.service... Sep 13 00:24:22.204524 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1665 (bootctl) Sep 13 00:24:22.206841 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:24:22.242081 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:24:22.254821 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:24:22.255244 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:24:22.275370 kernel: loop0: detected capacity change from 0 to 203944 Sep 13 00:24:22.301274 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:24:22.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.390270 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:24:22.391355 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:24:22.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.397716 systemd-fsck[1676]: fsck.fat 4.2 (2021-01-31) Sep 13 00:24:22.397716 systemd-fsck[1676]: /dev/nvme0n1p1: 236 files, 117310/258078 clusters Sep 13 00:24:22.401279 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:24:22.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.407197 systemd[1]: Mounting boot.mount... Sep 13 00:24:22.426701 systemd[1]: Mounted boot.mount. Sep 13 00:24:22.453263 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:24:22.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.520995 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:24:22.599013 kernel: loop1: detected capacity change from 0 to 203944 Sep 13 00:24:22.619742 (sd-sysext)[1691]: Using extensions 'kubernetes'. Sep 13 00:24:22.621854 (sd-sysext)[1691]: Merged extensions into '/usr'. Sep 13 00:24:22.658785 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:24:22.661160 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:24:22.665870 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:24:22.671486 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:24:22.678260 systemd[1]: Starting modprobe@loop.service... Sep 13 00:24:22.680076 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:24:22.680344 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:24:22.687314 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:24:22.690069 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:24:22.690509 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:24:22.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.693769 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:24:22.694217 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:24:22.697123 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:24:22.697556 systemd[1]: Finished modprobe@loop.service. Sep 13 00:24:22.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.702927 systemd[1]: Finished systemd-sysext.service. Sep 13 00:24:22.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:22.708486 systemd[1]: Starting ensure-sysext.service... Sep 13 00:24:22.714242 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:24:22.714388 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:24:22.717160 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:24:22.725093 systemd[1]: Reloading. Sep 13 00:24:22.755738 systemd-tmpfiles[1698]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:24:22.770387 systemd-tmpfiles[1698]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:24:22.782124 systemd-tmpfiles[1698]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:24:22.859442 /usr/lib/systemd/system-generators/torcx-generator[1718]: time="2025-09-13T00:24:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:24:22.860685 /usr/lib/systemd/system-generators/torcx-generator[1718]: time="2025-09-13T00:24:22Z" level=info msg="torcx already run" Sep 13 00:24:23.058654 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:24:23.058691 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:24:23.108949 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:24:23.255000 audit: BPF prog-id=30 op=LOAD Sep 13 00:24:23.256000 audit: BPF prog-id=31 op=LOAD Sep 13 00:24:23.256000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:24:23.256000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:24:23.260000 audit: BPF prog-id=32 op=LOAD Sep 13 00:24:23.260000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:24:23.260000 audit: BPF prog-id=33 op=LOAD Sep 13 00:24:23.260000 audit: BPF prog-id=34 op=LOAD Sep 13 00:24:23.260000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:24:23.260000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:24:23.262000 audit: BPF prog-id=35 op=LOAD Sep 13 00:24:23.262000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:24:23.264000 audit: BPF prog-id=36 op=LOAD Sep 13 00:24:23.264000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:24:23.264000 audit: BPF prog-id=37 op=LOAD Sep 13 00:24:23.264000 audit: BPF prog-id=38 op=LOAD Sep 13 00:24:23.264000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:24:23.264000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:24:23.279162 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:24:23.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.288786 systemd[1]: Starting audit-rules.service... Sep 13 00:24:23.295901 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:24:23.300656 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:24:23.305000 audit: BPF prog-id=39 op=LOAD Sep 13 00:24:23.308396 systemd[1]: Starting systemd-resolved.service... Sep 13 00:24:23.315000 audit: BPF prog-id=40 op=LOAD Sep 13 00:24:23.318606 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:24:23.322768 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:24:23.342715 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.345500 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:24:23.352387 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:24:23.361028 systemd[1]: Starting modprobe@loop.service... Sep 13 00:24:23.362794 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.363158 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:24:23.365312 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:24:23.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.368127 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:24:23.371197 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.371505 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.371719 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:24:23.371930 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:24:23.375000 audit[1780]: SYSTEM_BOOT pid=1780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.384386 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.390017 systemd[1]: Starting modprobe@drm.service... Sep 13 00:24:23.391909 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.392250 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:24:23.392573 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:24:23.394301 systemd[1]: Finished ensure-sysext.service. Sep 13 00:24:23.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.398610 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:24:23.398942 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:24:23.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.405230 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:24:23.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.411020 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:24:23.411332 systemd[1]: Finished modprobe@loop.service. Sep 13 00:24:23.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.416142 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:24:23.416452 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:24:23.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.418846 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:24:23.418916 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.427843 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:24:23.428200 systemd[1]: Finished modprobe@drm.service. Sep 13 00:24:23.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.464105 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:24:23.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.489147 systemd-networkd[1552]: eth0: Gained IPv6LL Sep 13 00:24:23.497679 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:24:23.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:23.547659 systemd-resolved[1778]: Positive Trust Anchors: Sep 13 00:24:23.547687 systemd-resolved[1778]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:24:23.547738 systemd-resolved[1778]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:24:23.555513 augenrules[1799]: No rules Sep 13 00:24:23.554000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:24:23.554000 audit[1799]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc946a6b0 a2=420 a3=0 items=0 ppid=1775 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:23.554000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:24:23.557251 systemd[1]: Finished audit-rules.service. Sep 13 00:24:23.567950 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:24:23.570743 systemd[1]: Reached target time-set.target. Sep 13 00:24:23.596112 ldconfig[1664]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:24:23.606405 systemd[1]: Finished ldconfig.service. Sep 13 00:24:23.610483 systemd[1]: Starting systemd-update-done.service... Sep 13 00:24:23.615529 systemd-resolved[1778]: Defaulting to hostname 'linux'. Sep 13 00:24:23.618934 systemd[1]: Started systemd-resolved.service. Sep 13 00:24:23.621093 systemd[1]: Reached target network.target. Sep 13 00:24:23.622883 systemd[1]: Reached target network-online.target. Sep 13 00:24:23.624811 systemd[1]: Reached target nss-lookup.target. Sep 13 00:24:23.634069 systemd[1]: Finished systemd-update-done.service. Sep 13 00:24:23.636196 systemd[1]: Reached target sysinit.target. Sep 13 00:24:23.638326 systemd[1]: Started motdgen.path. Sep 13 00:24:23.639932 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:24:23.642668 systemd[1]: Started logrotate.timer. Sep 13 00:24:23.644406 systemd[1]: Started mdadm.timer. Sep 13 00:24:23.645918 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:24:23.647831 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:24:23.647887 systemd[1]: Reached target paths.target. Sep 13 00:24:23.649579 systemd[1]: Reached target timers.target. Sep 13 00:24:23.652010 systemd[1]: Listening on dbus.socket. Sep 13 00:24:23.655504 systemd[1]: Starting docker.socket... Sep 13 00:24:23.657385 systemd-timesyncd[1779]: Contacted time server 23.157.160.168:123 (0.flatcar.pool.ntp.org). Sep 13 00:24:23.657504 systemd-timesyncd[1779]: Initial clock synchronization to Sat 2025-09-13 00:24:23.451941 UTC. Sep 13 00:24:23.662643 systemd[1]: Listening on sshd.socket. Sep 13 00:24:23.664602 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:24:23.665552 systemd[1]: Listening on docker.socket. Sep 13 00:24:23.667508 systemd[1]: Reached target sockets.target. Sep 13 00:24:23.669295 systemd[1]: Reached target basic.target. Sep 13 00:24:23.671048 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.671113 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:24:23.673264 systemd[1]: Started amazon-ssm-agent.service. Sep 13 00:24:23.677609 systemd[1]: Starting containerd.service... Sep 13 00:24:23.683081 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 13 00:24:23.687403 systemd[1]: Starting dbus.service... Sep 13 00:24:23.692801 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:24:23.700297 systemd[1]: Starting extend-filesystems.service... Sep 13 00:24:23.702447 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:24:23.705570 systemd[1]: Starting kubelet.service... Sep 13 00:24:23.709482 systemd[1]: Starting motdgen.service... Sep 13 00:24:23.715199 systemd[1]: Started nvidia.service. Sep 13 00:24:23.720710 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:24:23.727401 systemd[1]: Starting sshd-keygen.service... Sep 13 00:24:23.745931 systemd[1]: Starting systemd-logind.service... Sep 13 00:24:23.762060 jq[1812]: false Sep 13 00:24:23.747726 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:24:23.747878 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:24:23.748887 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:24:23.750478 systemd[1]: Starting update-engine.service... Sep 13 00:24:23.755685 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:24:23.797268 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:24:23.805789 jq[1821]: true Sep 13 00:24:23.797665 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:24:23.855610 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:24:23.905560 jq[1835]: true Sep 13 00:24:23.909376 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:24:23.924787 dbus-daemon[1811]: [system] SELinux support is enabled Sep 13 00:24:23.926787 systemd[1]: Started dbus.service. Sep 13 00:24:23.932383 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:24:23.932459 systemd[1]: Reached target system-config.target. Sep 13 00:24:23.934656 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:24:23.934696 systemd[1]: Reached target user-config.target. Sep 13 00:24:23.948528 extend-filesystems[1813]: Found loop1 Sep 13 00:24:23.950562 extend-filesystems[1813]: Found nvme0n1 Sep 13 00:24:23.950562 extend-filesystems[1813]: Found nvme0n1p1 Sep 13 00:24:23.950562 extend-filesystems[1813]: Found nvme0n1p2 Sep 13 00:24:23.950562 extend-filesystems[1813]: Found nvme0n1p3 Sep 13 00:24:23.950562 extend-filesystems[1813]: Found usr Sep 13 00:24:23.950562 extend-filesystems[1813]: Found nvme0n1p4 Sep 13 00:24:23.950562 extend-filesystems[1813]: Found nvme0n1p6 Sep 13 00:24:23.970214 extend-filesystems[1813]: Found nvme0n1p7 Sep 13 00:24:23.971980 extend-filesystems[1813]: Found nvme0n1p9 Sep 13 00:24:23.971980 extend-filesystems[1813]: Checking size of /dev/nvme0n1p9 Sep 13 00:24:23.984954 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:24:23.985305 systemd[1]: Finished motdgen.service. Sep 13 00:24:24.010465 dbus-daemon[1811]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1552 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 13 00:24:24.018353 systemd[1]: Starting systemd-hostnamed.service... Sep 13 00:24:24.134388 extend-filesystems[1813]: Resized partition /dev/nvme0n1p9 Sep 13 00:24:24.137511 bash[1867]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:24:24.139530 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:24:24.171446 extend-filesystems[1871]: resize2fs 1.46.5 (30-Dec-2021) Sep 13 00:24:24.199011 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Sep 13 00:24:24.223571 update_engine[1820]: I0913 00:24:24.222659 1820 main.cc:92] Flatcar Update Engine starting Sep 13 00:24:24.230311 systemd[1]: Started update-engine.service. Sep 13 00:24:24.232789 update_engine[1820]: I0913 00:24:24.230387 1820 update_check_scheduler.cc:74] Next update check in 7m12s Sep 13 00:24:24.235499 systemd[1]: Started locksmithd.service. Sep 13 00:24:24.242826 amazon-ssm-agent[1808]: 2025/09/13 00:24:24 Failed to load instance info from vault. RegistrationKey does not exist. Sep 13 00:24:24.263662 amazon-ssm-agent[1808]: Initializing new seelog logger Sep 13 00:24:24.272306 amazon-ssm-agent[1808]: New Seelog Logger Creation Complete Sep 13 00:24:24.272683 amazon-ssm-agent[1808]: 2025/09/13 00:24:24 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:24:24.272883 amazon-ssm-agent[1808]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:24:24.275497 amazon-ssm-agent[1808]: 2025/09/13 00:24:24 processing appconfig overrides Sep 13 00:24:24.285564 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Sep 13 00:24:24.307902 extend-filesystems[1871]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Sep 13 00:24:24.307902 extend-filesystems[1871]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 13 00:24:24.307902 extend-filesystems[1871]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Sep 13 00:24:24.332146 extend-filesystems[1813]: Resized filesystem in /dev/nvme0n1p9 Sep 13 00:24:24.313118 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:24:24.313490 systemd[1]: Finished extend-filesystems.service. Sep 13 00:24:24.354839 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:24:24.356038 systemd-logind[1819]: Watching system buttons on /dev/input/event0 (Power Button) Sep 13 00:24:24.356089 systemd-logind[1819]: Watching system buttons on /dev/input/event1 (Sleep Button) Sep 13 00:24:24.370537 systemd-logind[1819]: New seat seat0. Sep 13 00:24:24.378485 systemd[1]: Started systemd-logind.service. Sep 13 00:24:24.456342 env[1826]: time="2025-09-13T00:24:24.456251866Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:24:24.521805 dbus-daemon[1811]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 13 00:24:24.522075 systemd[1]: Started systemd-hostnamed.service. Sep 13 00:24:24.525283 dbus-daemon[1811]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1849 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 13 00:24:24.530225 systemd[1]: Starting polkit.service... Sep 13 00:24:24.564611 polkitd[1914]: Started polkitd version 121 Sep 13 00:24:24.594570 polkitd[1914]: Loading rules from directory /etc/polkit-1/rules.d Sep 13 00:24:24.594686 polkitd[1914]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 13 00:24:24.597574 polkitd[1914]: Finished loading, compiling and executing 2 rules Sep 13 00:24:24.599361 dbus-daemon[1811]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 13 00:24:24.599621 systemd[1]: Started polkit.service. Sep 13 00:24:24.601567 polkitd[1914]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 13 00:24:24.628576 systemd-resolved[1778]: System hostname changed to 'ip-172-31-31-159'. Sep 13 00:24:24.628595 systemd-hostnamed[1849]: Hostname set to (transient) Sep 13 00:24:24.632317 env[1826]: time="2025-09-13T00:24:24.632257942Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:24:24.633884 env[1826]: time="2025-09-13T00:24:24.633835983Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:24:24.647668 env[1826]: time="2025-09-13T00:24:24.647600357Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:24:24.648194 env[1826]: time="2025-09-13T00:24:24.648154198Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:24:24.648762 env[1826]: time="2025-09-13T00:24:24.648721380Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:24:24.652421 env[1826]: time="2025-09-13T00:24:24.652346021Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:24:24.652875 env[1826]: time="2025-09-13T00:24:24.652837040Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:24:24.653081 env[1826]: time="2025-09-13T00:24:24.653028790Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:24:24.653661 env[1826]: time="2025-09-13T00:24:24.653624710Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:24:24.655610 env[1826]: time="2025-09-13T00:24:24.655556085Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:24:24.662259 env[1826]: time="2025-09-13T00:24:24.662201333Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:24:24.667381 env[1826]: time="2025-09-13T00:24:24.667327666Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:24:24.668595 env[1826]: time="2025-09-13T00:24:24.668537688Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:24:24.669126 env[1826]: time="2025-09-13T00:24:24.669084678Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:24:24.679828 env[1826]: time="2025-09-13T00:24:24.679773645Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:24:24.680058 env[1826]: time="2025-09-13T00:24:24.680028566Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:24:24.680179 env[1826]: time="2025-09-13T00:24:24.680151111Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:24:24.680343 env[1826]: time="2025-09-13T00:24:24.680312601Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.680495 env[1826]: time="2025-09-13T00:24:24.680434351Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.680614 env[1826]: time="2025-09-13T00:24:24.680585669Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.680730 env[1826]: time="2025-09-13T00:24:24.680701725Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.681362 env[1826]: time="2025-09-13T00:24:24.681317603Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.681544 env[1826]: time="2025-09-13T00:24:24.681514065Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.681699 env[1826]: time="2025-09-13T00:24:24.681669066Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.681826 env[1826]: time="2025-09-13T00:24:24.681796475Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.682010 env[1826]: time="2025-09-13T00:24:24.681954984Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:24:24.682325 env[1826]: time="2025-09-13T00:24:24.682294521Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:24:24.682606 env[1826]: time="2025-09-13T00:24:24.682577866Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:24:24.683565 env[1826]: time="2025-09-13T00:24:24.683481755Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:24:24.683688 env[1826]: time="2025-09-13T00:24:24.683622984Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.683688 env[1826]: time="2025-09-13T00:24:24.683671950Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:24:24.683950 env[1826]: time="2025-09-13T00:24:24.683900763Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684052 env[1826]: time="2025-09-13T00:24:24.683946023Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684052 env[1826]: time="2025-09-13T00:24:24.684002905Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684052 env[1826]: time="2025-09-13T00:24:24.684033702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684224 env[1826]: time="2025-09-13T00:24:24.684063751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684224 env[1826]: time="2025-09-13T00:24:24.684092653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684321 env[1826]: time="2025-09-13T00:24:24.684278662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684321 env[1826]: time="2025-09-13T00:24:24.684311575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684432 env[1826]: time="2025-09-13T00:24:24.684344898Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:24:24.684670 env[1826]: time="2025-09-13T00:24:24.684622069Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684743 env[1826]: time="2025-09-13T00:24:24.684670077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684743 env[1826]: time="2025-09-13T00:24:24.684702125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.684743 env[1826]: time="2025-09-13T00:24:24.684731261Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:24:24.684900 env[1826]: time="2025-09-13T00:24:24.684766618Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:24:24.684900 env[1826]: time="2025-09-13T00:24:24.684794328Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:24:24.685036 env[1826]: time="2025-09-13T00:24:24.684999547Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:24:24.685092 env[1826]: time="2025-09-13T00:24:24.685066578Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:24:24.685674 env[1826]: time="2025-09-13T00:24:24.685551599Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:24:24.687688 env[1826]: time="2025-09-13T00:24:24.685689846Z" level=info msg="Connect containerd service" Sep 13 00:24:24.687688 env[1826]: time="2025-09-13T00:24:24.685772754Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:24:24.688388 env[1826]: time="2025-09-13T00:24:24.688330145Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:24:24.690009 env[1826]: time="2025-09-13T00:24:24.689915997Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:24:24.690139 env[1826]: time="2025-09-13T00:24:24.690111897Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:24:24.691217 env[1826]: time="2025-09-13T00:24:24.690941904Z" level=info msg="containerd successfully booted in 0.236277s" Sep 13 00:24:24.691083 systemd[1]: Started containerd.service. Sep 13 00:24:24.695534 env[1826]: time="2025-09-13T00:24:24.695363814Z" level=info msg="Start subscribing containerd event" Sep 13 00:24:24.695663 env[1826]: time="2025-09-13T00:24:24.695549554Z" level=info msg="Start recovering state" Sep 13 00:24:24.695756 env[1826]: time="2025-09-13T00:24:24.695711080Z" level=info msg="Start event monitor" Sep 13 00:24:24.695821 env[1826]: time="2025-09-13T00:24:24.695777678Z" level=info msg="Start snapshots syncer" Sep 13 00:24:24.695821 env[1826]: time="2025-09-13T00:24:24.695803704Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:24:24.695958 env[1826]: time="2025-09-13T00:24:24.695845164Z" level=info msg="Start streaming server" Sep 13 00:24:24.816423 coreos-metadata[1810]: Sep 13 00:24:24.801 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 13 00:24:24.819125 coreos-metadata[1810]: Sep 13 00:24:24.818 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Sep 13 00:24:24.822020 coreos-metadata[1810]: Sep 13 00:24:24.821 INFO Fetch successful Sep 13 00:24:24.822374 coreos-metadata[1810]: Sep 13 00:24:24.822 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 13 00:24:24.823593 coreos-metadata[1810]: Sep 13 00:24:24.823 INFO Fetch successful Sep 13 00:24:24.827928 unknown[1810]: wrote ssh authorized keys file for user: core Sep 13 00:24:24.866745 update-ssh-keys[1969]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:24:24.868004 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 13 00:24:25.058413 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Create new startup processor Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [LongRunningPluginsManager] registered plugins: {} Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing bookkeeping folders Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO removing the completed state files Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing bookkeeping folders for long running plugins Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing healthcheck folders for long running plugins Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing locations for inventory plugin Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing default location for custom inventory Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing default location for file inventory Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Initializing default location for role inventory Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Init the cloudwatchlogs publisher Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:softwareInventory Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:configurePackage Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:downloadContent Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:runPowerShellScript Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:updateSsmAgent Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:configureDocker Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:runDockerAction Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:refreshAssociation Sep 13 00:24:25.065713 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform independent plugin aws:runDocument Sep 13 00:24:25.066959 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Successfully loaded platform dependent plugin aws:runShellScript Sep 13 00:24:25.066959 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Sep 13 00:24:25.066959 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO OS: linux, Arch: arm64 Sep 13 00:24:25.085817 amazon-ssm-agent[1808]: datastore file /var/lib/amazon/ssm/i-03b7ce56bc1332ea4/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Sep 13 00:24:25.103123 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] Starting document processing engine... Sep 13 00:24:25.202435 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] [EngineProcessor] Starting Sep 13 00:24:25.297681 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Sep 13 00:24:25.392394 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] Starting message polling Sep 13 00:24:25.487465 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] Starting send replies to MDS Sep 13 00:24:25.498319 locksmithd[1885]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:24:25.581939 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [instanceID=i-03b7ce56bc1332ea4] Starting association polling Sep 13 00:24:25.677110 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Sep 13 00:24:25.772357 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] [Association] Launching response handler Sep 13 00:24:25.867846 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Sep 13 00:24:25.963647 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Sep 13 00:24:26.059486 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Sep 13 00:24:26.091713 systemd[1]: Started kubelet.service. Sep 13 00:24:26.155632 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] Starting session document processing engine... Sep 13 00:24:26.252020 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] [EngineProcessor] Starting Sep 13 00:24:26.348424 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Sep 13 00:24:26.445087 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-03b7ce56bc1332ea4, requestId: 71a3a195-0162-4d2b-af08-f40c053ad723 Sep 13 00:24:26.542073 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [OfflineService] Starting document processing engine... Sep 13 00:24:26.639069 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [OfflineService] [EngineProcessor] Starting Sep 13 00:24:26.736309 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [OfflineService] [EngineProcessor] Initial processing Sep 13 00:24:26.833851 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [OfflineService] Starting message polling Sep 13 00:24:26.931581 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [OfflineService] Starting send replies to MDS Sep 13 00:24:27.029452 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [LongRunningPluginsManager] starting long running plugin manager Sep 13 00:24:27.054278 kubelet[2006]: E0913 00:24:27.054208 2006 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:24:27.058263 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:24:27.058578 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:24:27.059015 systemd[1]: kubelet.service: Consumed 1.623s CPU time. Sep 13 00:24:27.127569 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Sep 13 00:24:27.225731 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [HealthCheck] HealthCheck reporting agent health. Sep 13 00:24:27.324117 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Sep 13 00:24:27.422832 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] listening reply. Sep 13 00:24:27.521574 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [StartupProcessor] Executing startup processor tasks Sep 13 00:24:27.620589 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Sep 13 00:24:27.719822 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Sep 13 00:24:27.819163 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Sep 13 00:24:27.918733 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-03b7ce56bc1332ea4?role=subscribe&stream=input Sep 13 00:24:28.018575 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-03b7ce56bc1332ea4?role=subscribe&stream=input Sep 13 00:24:28.118500 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] Starting receiving message from control channel Sep 13 00:24:28.218675 amazon-ssm-agent[1808]: 2025-09-13 00:24:25 INFO [MessageGatewayService] [EngineProcessor] Initial processing Sep 13 00:24:28.734682 sshd_keygen[1843]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:24:28.772561 systemd[1]: Finished sshd-keygen.service. Sep 13 00:24:28.777075 systemd[1]: Starting issuegen.service... Sep 13 00:24:28.789079 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:24:28.789437 systemd[1]: Finished issuegen.service. Sep 13 00:24:28.794222 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:24:28.811137 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:24:28.816084 systemd[1]: Started getty@tty1.service. Sep 13 00:24:28.820413 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:24:28.822821 systemd[1]: Reached target getty.target. Sep 13 00:24:28.824830 systemd[1]: Reached target multi-user.target. Sep 13 00:24:28.829744 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:24:28.847356 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:24:28.847855 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:24:28.852120 systemd[1]: Startup finished in 1.190s (kernel) + 8.513s (initrd) + 13.738s (userspace) = 23.442s. Sep 13 00:24:32.866860 systemd[1]: Created slice system-sshd.slice. Sep 13 00:24:32.869283 systemd[1]: Started sshd@0-172.31.31.159:22-139.178.89.65:34522.service. Sep 13 00:24:33.260171 sshd[2027]: Accepted publickey for core from 139.178.89.65 port 34522 ssh2: RSA SHA256:UwEWMHPIiY0JWRoNDVbebEOPypC7B+efyco4MjsCg+8 Sep 13 00:24:33.265167 sshd[2027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:33.286463 systemd[1]: Created slice user-500.slice. Sep 13 00:24:33.288796 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:24:33.298179 systemd-logind[1819]: New session 1 of user core. Sep 13 00:24:33.311201 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:24:33.315624 systemd[1]: Starting user@500.service... Sep 13 00:24:33.323057 (systemd)[2030]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:33.523892 systemd[2030]: Queued start job for default target default.target. Sep 13 00:24:33.524915 systemd[2030]: Reached target paths.target. Sep 13 00:24:33.525011 systemd[2030]: Reached target sockets.target. Sep 13 00:24:33.525048 systemd[2030]: Reached target timers.target. Sep 13 00:24:33.525079 systemd[2030]: Reached target basic.target. Sep 13 00:24:33.525233 systemd[1]: Started user@500.service. Sep 13 00:24:33.527105 systemd[1]: Started session-1.scope. Sep 13 00:24:33.528013 systemd[2030]: Reached target default.target. Sep 13 00:24:33.528333 systemd[2030]: Startup finished in 193ms. Sep 13 00:24:33.674623 systemd[1]: Started sshd@1-172.31.31.159:22-139.178.89.65:34534.service. Sep 13 00:24:33.844513 sshd[2039]: Accepted publickey for core from 139.178.89.65 port 34534 ssh2: RSA SHA256:UwEWMHPIiY0JWRoNDVbebEOPypC7B+efyco4MjsCg+8 Sep 13 00:24:33.846911 sshd[2039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:33.856143 systemd[1]: Started session-2.scope. Sep 13 00:24:33.858026 systemd-logind[1819]: New session 2 of user core. Sep 13 00:24:33.988209 sshd[2039]: pam_unix(sshd:session): session closed for user core Sep 13 00:24:33.992997 systemd-logind[1819]: Session 2 logged out. Waiting for processes to exit. Sep 13 00:24:33.993612 systemd[1]: sshd@1-172.31.31.159:22-139.178.89.65:34534.service: Deactivated successfully. Sep 13 00:24:33.994852 systemd[1]: session-2.scope: Deactivated successfully. Sep 13 00:24:33.996384 systemd-logind[1819]: Removed session 2. Sep 13 00:24:34.019045 systemd[1]: Started sshd@2-172.31.31.159:22-139.178.89.65:34538.service. Sep 13 00:24:34.190908 sshd[2045]: Accepted publickey for core from 139.178.89.65 port 34538 ssh2: RSA SHA256:UwEWMHPIiY0JWRoNDVbebEOPypC7B+efyco4MjsCg+8 Sep 13 00:24:34.193075 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:34.201828 systemd[1]: Started session-3.scope. Sep 13 00:24:34.203112 systemd-logind[1819]: New session 3 of user core. Sep 13 00:24:34.325489 sshd[2045]: pam_unix(sshd:session): session closed for user core Sep 13 00:24:34.330429 systemd[1]: sshd@2-172.31.31.159:22-139.178.89.65:34538.service: Deactivated successfully. Sep 13 00:24:34.331670 systemd[1]: session-3.scope: Deactivated successfully. Sep 13 00:24:34.332834 systemd-logind[1819]: Session 3 logged out. Waiting for processes to exit. Sep 13 00:24:34.334389 systemd-logind[1819]: Removed session 3. Sep 13 00:24:34.352536 systemd[1]: Started sshd@3-172.31.31.159:22-139.178.89.65:34552.service. Sep 13 00:24:34.522061 sshd[2051]: Accepted publickey for core from 139.178.89.65 port 34552 ssh2: RSA SHA256:UwEWMHPIiY0JWRoNDVbebEOPypC7B+efyco4MjsCg+8 Sep 13 00:24:34.525134 sshd[2051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:34.533065 systemd-logind[1819]: New session 4 of user core. Sep 13 00:24:34.534190 systemd[1]: Started session-4.scope. Sep 13 00:24:34.664145 sshd[2051]: pam_unix(sshd:session): session closed for user core Sep 13 00:24:34.670032 systemd[1]: sshd@3-172.31.31.159:22-139.178.89.65:34552.service: Deactivated successfully. Sep 13 00:24:34.670651 systemd-logind[1819]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:24:34.671263 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:24:34.672974 systemd-logind[1819]: Removed session 4. Sep 13 00:24:34.694620 systemd[1]: Started sshd@4-172.31.31.159:22-139.178.89.65:34564.service. Sep 13 00:24:34.865418 sshd[2057]: Accepted publickey for core from 139.178.89.65 port 34564 ssh2: RSA SHA256:UwEWMHPIiY0JWRoNDVbebEOPypC7B+efyco4MjsCg+8 Sep 13 00:24:34.867611 sshd[2057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:34.875572 systemd-logind[1819]: New session 5 of user core. Sep 13 00:24:34.876561 systemd[1]: Started session-5.scope. Sep 13 00:24:35.028655 sudo[2060]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:24:35.029843 sudo[2060]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:24:35.054252 dbus-daemon[1811]: avc: received setenforce notice (enforcing=1) Sep 13 00:24:35.057148 sudo[2060]: pam_unix(sudo:session): session closed for user root Sep 13 00:24:35.082611 sshd[2057]: pam_unix(sshd:session): session closed for user core Sep 13 00:24:35.088198 systemd-logind[1819]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:24:35.088438 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:24:35.089822 systemd[1]: sshd@4-172.31.31.159:22-139.178.89.65:34564.service: Deactivated successfully. Sep 13 00:24:35.091763 systemd-logind[1819]: Removed session 5. Sep 13 00:24:35.111668 systemd[1]: Started sshd@5-172.31.31.159:22-139.178.89.65:34566.service. Sep 13 00:24:35.281214 sshd[2064]: Accepted publickey for core from 139.178.89.65 port 34566 ssh2: RSA SHA256:UwEWMHPIiY0JWRoNDVbebEOPypC7B+efyco4MjsCg+8 Sep 13 00:24:35.284570 sshd[2064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:35.292569 systemd-logind[1819]: New session 6 of user core. Sep 13 00:24:35.293603 systemd[1]: Started session-6.scope. Sep 13 00:24:35.400260 sudo[2068]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:24:35.400801 sudo[2068]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:24:35.406126 sudo[2068]: pam_unix(sudo:session): session closed for user root Sep 13 00:24:35.415467 sudo[2067]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:24:35.416059 sudo[2067]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:24:35.433408 systemd[1]: Stopping audit-rules.service... Sep 13 00:24:35.435000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:24:35.438386 kernel: kauditd_printk_skb: 114 callbacks suppressed Sep 13 00:24:35.438446 kernel: audit: type=1305 audit(1757723075.435:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:24:35.442298 auditctl[2071]: No rules Sep 13 00:24:35.435000 audit[2071]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe847d8e0 a2=420 a3=0 items=0 ppid=1 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:35.443211 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:24:35.443562 systemd[1]: Stopped audit-rules.service. Sep 13 00:24:35.454546 kernel: audit: type=1300 audit(1757723075.435:208): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe847d8e0 a2=420 a3=0 items=0 ppid=1 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:35.435000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:24:35.459080 kernel: audit: type=1327 audit(1757723075.435:208): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:24:35.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.467128 kernel: audit: type=1131 audit(1757723075.442:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.461184 systemd[1]: Starting audit-rules.service... Sep 13 00:24:35.491813 augenrules[2088]: No rules Sep 13 00:24:35.493547 systemd[1]: Finished audit-rules.service. Sep 13 00:24:35.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.502832 sudo[2067]: pam_unix(sudo:session): session closed for user root Sep 13 00:24:35.501000 audit[2067]: USER_END pid=2067 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.513385 kernel: audit: type=1130 audit(1757723075.492:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.513444 kernel: audit: type=1106 audit(1757723075.501:211): pid=2067 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.502000 audit[2067]: CRED_DISP pid=2067 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.521775 kernel: audit: type=1104 audit(1757723075.502:212): pid=2067 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.526125 sshd[2064]: pam_unix(sshd:session): session closed for user core Sep 13 00:24:35.527000 audit[2064]: USER_END pid=2064 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.527000 audit[2064]: CRED_DISP pid=2064 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.540134 systemd[1]: sshd@5-172.31.31.159:22-139.178.89.65:34566.service: Deactivated successfully. Sep 13 00:24:35.541512 kernel: audit: type=1106 audit(1757723075.527:213): pid=2064 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.541404 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:24:35.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.159:22-139.178.89.65:34566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.551635 systemd-logind[1819]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:24:35.561634 kernel: audit: type=1104 audit(1757723075.527:214): pid=2064 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.561696 kernel: audit: type=1131 audit(1757723075.539:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.159:22-139.178.89.65:34566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.562485 systemd[1]: Started sshd@6-172.31.31.159:22-139.178.89.65:34574.service. Sep 13 00:24:35.565620 systemd-logind[1819]: Removed session 6. Sep 13 00:24:35.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.159:22-139.178.89.65:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.735000 audit[2094]: USER_ACCT pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.737034 sshd[2094]: Accepted publickey for core from 139.178.89.65 port 34574 ssh2: RSA SHA256:UwEWMHPIiY0JWRoNDVbebEOPypC7B+efyco4MjsCg+8 Sep 13 00:24:35.737000 audit[2094]: CRED_ACQ pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.737000 audit[2094]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6771b00 a2=3 a3=1 items=0 ppid=1 pid=2094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:35.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:24:35.740003 sshd[2094]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:24:35.748531 systemd[1]: Started session-7.scope. Sep 13 00:24:35.749502 systemd-logind[1819]: New session 7 of user core. Sep 13 00:24:35.758000 audit[2094]: USER_START pid=2094 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.760000 audit[2096]: CRED_ACQ pid=2096 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:35.856000 audit[2097]: USER_ACCT pid=2097 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.857598 sudo[2097]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:24:35.857000 audit[2097]: CRED_REFR pid=2097 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.858936 sudo[2097]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:24:35.859000 audit[2097]: USER_START pid=2097 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:35.884352 systemd[1]: Starting coreos-metadata.service... Sep 13 00:24:35.933507 amazon-ssm-agent[1808]: 2025-09-13 00:24:35 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Sep 13 00:24:36.055820 coreos-metadata[2101]: Sep 13 00:24:36.055 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 13 00:24:36.056877 coreos-metadata[2101]: Sep 13 00:24:36.056 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Sep 13 00:24:36.057688 coreos-metadata[2101]: Sep 13 00:24:36.057 INFO Fetch successful Sep 13 00:24:36.058039 coreos-metadata[2101]: Sep 13 00:24:36.057 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Sep 13 00:24:36.058389 coreos-metadata[2101]: Sep 13 00:24:36.058 INFO Fetch successful Sep 13 00:24:36.058711 coreos-metadata[2101]: Sep 13 00:24:36.058 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Sep 13 00:24:36.059405 coreos-metadata[2101]: Sep 13 00:24:36.059 INFO Fetch successful Sep 13 00:24:36.059762 coreos-metadata[2101]: Sep 13 00:24:36.059 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Sep 13 00:24:36.060312 coreos-metadata[2101]: Sep 13 00:24:36.060 INFO Fetch successful Sep 13 00:24:36.060666 coreos-metadata[2101]: Sep 13 00:24:36.060 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Sep 13 00:24:36.061321 coreos-metadata[2101]: Sep 13 00:24:36.061 INFO Fetch successful Sep 13 00:24:36.061634 coreos-metadata[2101]: Sep 13 00:24:36.061 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Sep 13 00:24:36.062110 coreos-metadata[2101]: Sep 13 00:24:36.061 INFO Fetch successful Sep 13 00:24:36.062438 coreos-metadata[2101]: Sep 13 00:24:36.062 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Sep 13 00:24:36.062848 coreos-metadata[2101]: Sep 13 00:24:36.062 INFO Fetch successful Sep 13 00:24:36.063253 coreos-metadata[2101]: Sep 13 00:24:36.063 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Sep 13 00:24:36.063666 coreos-metadata[2101]: Sep 13 00:24:36.063 INFO Fetch successful Sep 13 00:24:36.077614 systemd[1]: Finished coreos-metadata.service. Sep 13 00:24:36.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:37.238542 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:24:37.238895 systemd[1]: Stopped kubelet.service. Sep 13 00:24:37.239004 systemd[1]: kubelet.service: Consumed 1.623s CPU time. Sep 13 00:24:37.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:37.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:37.241516 systemd[1]: Starting kubelet.service... Sep 13 00:24:37.287145 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Sep 13 00:24:37.287374 systemd[1]: kubelet.service: Failed with result 'signal'. Sep 13 00:24:37.287865 systemd[1]: Stopped kubelet.service. Sep 13 00:24:37.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:24:37.292406 systemd[1]: Starting kubelet.service... Sep 13 00:24:37.341990 systemd[1]: Reloading. Sep 13 00:24:37.485855 /usr/lib/systemd/system-generators/torcx-generator[2160]: time="2025-09-13T00:24:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:24:37.485928 /usr/lib/systemd/system-generators/torcx-generator[2160]: time="2025-09-13T00:24:37Z" level=info msg="torcx already run" Sep 13 00:24:37.702640 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:24:37.703109 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:24:37.744421 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:24:37.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.906000 audit: BPF prog-id=49 op=LOAD Sep 13 00:24:37.906000 audit: BPF prog-id=47 op=UNLOAD Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.910000 audit: BPF prog-id=50 op=LOAD Sep 13 00:24:37.910000 audit: BPF prog-id=39 op=UNLOAD Sep 13 00:24:37.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit: BPF prog-id=51 op=LOAD Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.913000 audit: BPF prog-id=52 op=LOAD Sep 13 00:24:37.913000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:24:37.914000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:24:37.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.917000 audit: BPF prog-id=53 op=LOAD Sep 13 00:24:37.917000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.923000 audit: BPF prog-id=54 op=LOAD Sep 13 00:24:37.923000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:24:37.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.924000 audit: BPF prog-id=55 op=LOAD Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.925000 audit: BPF prog-id=56 op=LOAD Sep 13 00:24:37.926000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:24:37.926000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:24:37.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.929000 audit: BPF prog-id=57 op=LOAD Sep 13 00:24:37.929000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit: BPF prog-id=58 op=LOAD Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.931000 audit: BPF prog-id=59 op=LOAD Sep 13 00:24:37.931000 audit: BPF prog-id=42 op=UNLOAD Sep 13 00:24:37.931000 audit: BPF prog-id=43 op=UNLOAD Sep 13 00:24:37.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.933000 audit: BPF prog-id=60 op=LOAD Sep 13 00:24:37.933000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit: BPF prog-id=61 op=LOAD Sep 13 00:24:37.935000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit: BPF prog-id=62 op=LOAD Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.935000 audit: BPF prog-id=63 op=LOAD Sep 13 00:24:37.935000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:24:37.935000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit: BPF prog-id=64 op=LOAD Sep 13 00:24:37.941000 audit: BPF prog-id=44 op=UNLOAD Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit: BPF prog-id=65 op=LOAD Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:37.941000 audit: BPF prog-id=66 op=LOAD Sep 13 00:24:37.941000 audit: BPF prog-id=45 op=UNLOAD Sep 13 00:24:37.942000 audit: BPF prog-id=46 op=UNLOAD Sep 13 00:24:37.986213 systemd[1]: Started kubelet.service. Sep 13 00:24:37.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:38.002514 systemd[1]: Stopping kubelet.service... Sep 13 00:24:38.003632 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:24:38.004045 systemd[1]: Stopped kubelet.service. Sep 13 00:24:38.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:38.008246 systemd[1]: Starting kubelet.service... Sep 13 00:24:38.361940 systemd[1]: Started kubelet.service. Sep 13 00:24:38.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:38.440105 kubelet[2224]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:24:38.440105 kubelet[2224]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 13 00:24:38.440105 kubelet[2224]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:24:38.440758 kubelet[2224]: I0913 00:24:38.440208 2224 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:24:39.508518 kubelet[2224]: I0913 00:24:39.508450 2224 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 13 00:24:39.508518 kubelet[2224]: I0913 00:24:39.508500 2224 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:24:39.509189 kubelet[2224]: I0913 00:24:39.508898 2224 server.go:934] "Client rotation is on, will bootstrap in background" Sep 13 00:24:39.559020 kubelet[2224]: I0913 00:24:39.558945 2224 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:24:39.575090 kubelet[2224]: E0913 00:24:39.575013 2224 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:24:39.575090 kubelet[2224]: I0913 00:24:39.575078 2224 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:24:39.583383 kubelet[2224]: I0913 00:24:39.583309 2224 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:24:39.584149 kubelet[2224]: I0913 00:24:39.584108 2224 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 13 00:24:39.584462 kubelet[2224]: I0913 00:24:39.584404 2224 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:24:39.584735 kubelet[2224]: I0913 00:24:39.584457 2224 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.31.159","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:24:39.584919 kubelet[2224]: I0913 00:24:39.584877 2224 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:24:39.584919 kubelet[2224]: I0913 00:24:39.584900 2224 container_manager_linux.go:300] "Creating device plugin manager" Sep 13 00:24:39.585254 kubelet[2224]: I0913 00:24:39.585228 2224 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:24:39.596255 kubelet[2224]: I0913 00:24:39.596221 2224 kubelet.go:408] "Attempting to sync node with API server" Sep 13 00:24:39.596455 kubelet[2224]: I0913 00:24:39.596434 2224 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:24:39.596614 kubelet[2224]: I0913 00:24:39.596594 2224 kubelet.go:314] "Adding apiserver pod source" Sep 13 00:24:39.596859 kubelet[2224]: I0913 00:24:39.596840 2224 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:24:39.597021 kubelet[2224]: E0913 00:24:39.596797 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:39.597152 kubelet[2224]: E0913 00:24:39.596744 2224 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:39.605393 kubelet[2224]: I0913 00:24:39.605335 2224 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:24:39.606881 kubelet[2224]: I0913 00:24:39.606805 2224 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:24:39.607223 kubelet[2224]: W0913 00:24:39.607185 2224 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:24:39.610179 kubelet[2224]: I0913 00:24:39.610014 2224 server.go:1274] "Started kubelet" Sep 13 00:24:39.611000 audit[2224]: AVC avc: denied { mac_admin } for pid=2224 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:39.611000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:24:39.611000 audit[2224]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400074e960 a1=40009f16f8 a2=400074e930 a3=25 items=0 ppid=1 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:24:39.611000 audit[2224]: AVC avc: denied { mac_admin } for pid=2224 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:39.611000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:24:39.611000 audit[2224]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000478e60 a1=40009f1710 a2=400074e9f0 a3=25 items=0 ppid=1 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:24:39.613344 kubelet[2224]: I0913 00:24:39.612521 2224 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:24:39.613344 kubelet[2224]: I0913 00:24:39.612600 2224 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 13 00:24:39.613344 kubelet[2224]: I0913 00:24:39.612714 2224 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:24:39.624866 kubelet[2224]: I0913 00:24:39.624793 2224 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:24:39.626798 kubelet[2224]: I0913 00:24:39.626693 2224 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:24:39.628549 kubelet[2224]: I0913 00:24:39.628487 2224 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:24:39.628707 kubelet[2224]: I0913 00:24:39.626896 2224 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 13 00:24:39.628707 kubelet[2224]: I0913 00:24:39.626851 2224 server.go:449] "Adding debug handlers to kubelet server" Sep 13 00:24:39.630310 kubelet[2224]: E0913 00:24:39.627315 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:39.630310 kubelet[2224]: I0913 00:24:39.627644 2224 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:24:39.630485 kubelet[2224]: I0913 00:24:39.626943 2224 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 13 00:24:39.630565 kubelet[2224]: I0913 00:24:39.630489 2224 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:24:39.633253 kubelet[2224]: E0913 00:24:39.633206 2224 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:24:39.637042 kubelet[2224]: I0913 00:24:39.637006 2224 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:24:39.637269 kubelet[2224]: I0913 00:24:39.637247 2224 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:24:39.637634 kubelet[2224]: I0913 00:24:39.637590 2224 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:24:39.677498 kubelet[2224]: I0913 00:24:39.677466 2224 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 13 00:24:39.677733 kubelet[2224]: I0913 00:24:39.677709 2224 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 13 00:24:39.677854 kubelet[2224]: I0913 00:24:39.677831 2224 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:24:39.680595 kubelet[2224]: I0913 00:24:39.680561 2224 policy_none.go:49] "None policy: Start" Sep 13 00:24:39.682068 kubelet[2224]: I0913 00:24:39.682038 2224 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 13 00:24:39.682282 kubelet[2224]: I0913 00:24:39.682261 2224 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:24:39.694399 systemd[1]: Created slice kubepods.slice. Sep 13 00:24:39.697000 audit[2241]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.697000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdca659c0 a2=0 a3=1 items=0 ppid=2224 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:24:39.699000 audit[2244]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.699000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc1e27d60 a2=0 a3=1 items=0 ppid=2224 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:24:39.706940 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:24:39.713752 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:24:39.724677 kubelet[2224]: I0913 00:24:39.724638 2224 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:24:39.723000 audit[2224]: AVC avc: denied { mac_admin } for pid=2224 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:39.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:24:39.723000 audit[2224]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dced50 a1=40009f1230 a2=4000dced20 a3=25 items=0 ppid=1 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:24:39.725452 kubelet[2224]: I0913 00:24:39.725417 2224 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:24:39.725767 kubelet[2224]: I0913 00:24:39.725744 2224 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:24:39.725935 kubelet[2224]: I0913 00:24:39.725881 2224 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:24:39.727548 kubelet[2224]: I0913 00:24:39.727512 2224 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:24:39.729155 kubelet[2224]: W0913 00:24:39.728539 2224 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Sep 13 00:24:39.729155 kubelet[2224]: E0913 00:24:39.728645 2224 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 13 00:24:39.729155 kubelet[2224]: W0913 00:24:39.728819 2224 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 13 00:24:39.729155 kubelet[2224]: E0913 00:24:39.728850 2224 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 00:24:39.729155 kubelet[2224]: W0913 00:24:39.728929 2224 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.31.159" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 13 00:24:39.729155 kubelet[2224]: E0913 00:24:39.728955 2224 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.31.159\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 00:24:39.731684 kubelet[2224]: E0913 00:24:39.729373 2224 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.159.1864afd3fda8215d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.159,UID:172.31.31.159,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.31.159,},FirstTimestamp:2025-09-13 00:24:39.609950557 +0000 UTC m=+1.236828772,LastTimestamp:2025-09-13 00:24:39.609950557 +0000 UTC m=+1.236828772,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.159,}" Sep 13 00:24:39.731917 kubelet[2224]: E0913 00:24:39.731869 2224 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.31.159\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 13 00:24:39.737007 kubelet[2224]: E0913 00:24:39.736924 2224 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.159\" not found" Sep 13 00:24:39.716000 audit[2246]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.716000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffea60dd80 a2=0 a3=1 items=0 ppid=2224 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:24:39.749000 audit[2251]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.749000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd6252e0 a2=0 a3=1 items=0 ppid=2224 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:24:39.751403 kubelet[2224]: E0913 00:24:39.751282 2224 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.159.1864afd3ff0a2475 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.159,UID:172.31.31.159,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.31.159,},FirstTimestamp:2025-09-13 00:24:39.633151093 +0000 UTC m=+1.260029356,LastTimestamp:2025-09-13 00:24:39.633151093 +0000 UTC m=+1.260029356,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.159,}" Sep 13 00:24:39.827880 kubelet[2224]: I0913 00:24:39.827755 2224 kubelet_node_status.go:72] "Attempting to register node" node="172.31.31.159" Sep 13 00:24:39.868000 audit[2256]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.868000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd057b6b0 a2=0 a3=1 items=0 ppid=2224 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:24:39.870910 kubelet[2224]: I0913 00:24:39.870861 2224 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:24:39.871000 audit[2257]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:39.871000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd809c060 a2=0 a3=1 items=0 ppid=2224 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:24:39.872000 audit[2258]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.872000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8d01d50 a2=0 a3=1 items=0 ppid=2224 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:24:39.875139 kubelet[2224]: I0913 00:24:39.875098 2224 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:24:39.875349 kubelet[2224]: I0913 00:24:39.875327 2224 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 13 00:24:39.875699 kubelet[2224]: I0913 00:24:39.875676 2224 kubelet.go:2321] "Starting kubelet main sync loop" Sep 13 00:24:39.875925 kubelet[2224]: E0913 00:24:39.875890 2224 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 00:24:39.875000 audit[2259]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.875000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdee18430 a2=0 a3=1 items=0 ppid=2224 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:24:39.880302 kubelet[2224]: I0913 00:24:39.880144 2224 kubelet_node_status.go:75] "Successfully registered node" node="172.31.31.159" Sep 13 00:24:39.880302 kubelet[2224]: E0913 00:24:39.880206 2224 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"172.31.31.159\": node \"172.31.31.159\" not found" Sep 13 00:24:39.880000 audit[2261]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:39.880000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd44adb0 a2=0 a3=1 items=0 ppid=2224 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:24:39.881000 audit[2260]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:39.881000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffda1b910 a2=0 a3=1 items=0 ppid=2224 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:24:39.886000 audit[2262]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:39.886000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc3d21b40 a2=0 a3=1 items=0 ppid=2224 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:24:39.893000 audit[2263]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:39.893000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce72cf80 a2=0 a3=1 items=0 ppid=2224 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:39.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:24:40.047384 sudo[2097]: pam_unix(sudo:session): session closed for user root Sep 13 00:24:40.046000 audit[2097]: USER_END pid=2097 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:40.046000 audit[2097]: CRED_DISP pid=2097 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:24:40.071444 sshd[2094]: pam_unix(sshd:session): session closed for user core Sep 13 00:24:40.073000 audit[2094]: USER_END pid=2094 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:40.073000 audit[2094]: CRED_DISP pid=2094 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:24:40.077920 systemd[1]: sshd@6-172.31.31.159:22-139.178.89.65:34574.service: Deactivated successfully. Sep 13 00:24:40.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.159:22-139.178.89.65:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:40.079212 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:24:40.080107 systemd-logind[1819]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:24:40.083114 systemd-logind[1819]: Removed session 7. Sep 13 00:24:40.086412 kubelet[2224]: E0913 00:24:40.086349 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.186635 kubelet[2224]: E0913 00:24:40.186579 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.287364 kubelet[2224]: E0913 00:24:40.287315 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.388190 kubelet[2224]: E0913 00:24:40.388081 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.488942 kubelet[2224]: E0913 00:24:40.488890 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.512145 kubelet[2224]: I0913 00:24:40.512103 2224 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 00:24:40.512741 kubelet[2224]: W0913 00:24:40.512288 2224 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:24:40.589192 kubelet[2224]: E0913 00:24:40.589142 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.597409 kubelet[2224]: E0913 00:24:40.597364 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:40.689663 kubelet[2224]: E0913 00:24:40.689551 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.790233 kubelet[2224]: E0913 00:24:40.790194 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.890544 kubelet[2224]: E0913 00:24:40.890512 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:40.991370 kubelet[2224]: E0913 00:24:40.991243 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:41.092308 kubelet[2224]: E0913 00:24:41.092277 2224 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.31.159\" not found" Sep 13 00:24:41.194256 kubelet[2224]: I0913 00:24:41.194223 2224 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 00:24:41.195203 env[1826]: time="2025-09-13T00:24:41.194885348Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:24:41.196053 kubelet[2224]: I0913 00:24:41.196000 2224 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 00:24:41.597675 kubelet[2224]: E0913 00:24:41.597617 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:41.598839 kubelet[2224]: I0913 00:24:41.598799 2224 apiserver.go:52] "Watching apiserver" Sep 13 00:24:41.605034 kubelet[2224]: E0913 00:24:41.604987 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:41.615483 systemd[1]: Created slice kubepods-besteffort-pod86df3ea4_4d3b_4a58_a69c_ca015e0273d0.slice. Sep 13 00:24:41.634352 kubelet[2224]: I0913 00:24:41.633015 2224 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 13 00:24:41.633896 systemd[1]: Created slice kubepods-besteffort-podf43833be_b860_4dc3_a787_4d7878968390.slice. Sep 13 00:24:41.641959 kubelet[2224]: I0913 00:24:41.641896 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/86df3ea4-4d3b-4a58-a69c-ca015e0273d0-lib-modules\") pod \"kube-proxy-ktv4v\" (UID: \"86df3ea4-4d3b-4a58-a69c-ca015e0273d0\") " pod="kube-system/kube-proxy-ktv4v" Sep 13 00:24:41.642145 kubelet[2224]: I0913 00:24:41.642004 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2ktgj\" (UniqueName: \"kubernetes.io/projected/86df3ea4-4d3b-4a58-a69c-ca015e0273d0-kube-api-access-2ktgj\") pod \"kube-proxy-ktv4v\" (UID: \"86df3ea4-4d3b-4a58-a69c-ca015e0273d0\") " pod="kube-system/kube-proxy-ktv4v" Sep 13 00:24:41.642145 kubelet[2224]: I0913 00:24:41.642061 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-cni-net-dir\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642145 kubelet[2224]: I0913 00:24:41.642111 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-flexvol-driver-host\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642340 kubelet[2224]: I0913 00:24:41.642154 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f43833be-b860-4dc3-a787-4d7878968390-node-certs\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642340 kubelet[2224]: I0913 00:24:41.642205 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/80a7d795-cb4a-40f8-af15-3eed22f2f4c9-registration-dir\") pod \"csi-node-driver-kh44h\" (UID: \"80a7d795-cb4a-40f8-af15-3eed22f2f4c9\") " pod="calico-system/csi-node-driver-kh44h" Sep 13 00:24:41.642340 kubelet[2224]: I0913 00:24:41.642250 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/80a7d795-cb4a-40f8-af15-3eed22f2f4c9-varrun\") pod \"csi-node-driver-kh44h\" (UID: \"80a7d795-cb4a-40f8-af15-3eed22f2f4c9\") " pod="calico-system/csi-node-driver-kh44h" Sep 13 00:24:41.642340 kubelet[2224]: I0913 00:24:41.642298 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/86df3ea4-4d3b-4a58-a69c-ca015e0273d0-kube-proxy\") pod \"kube-proxy-ktv4v\" (UID: \"86df3ea4-4d3b-4a58-a69c-ca015e0273d0\") " pod="kube-system/kube-proxy-ktv4v" Sep 13 00:24:41.642545 kubelet[2224]: I0913 00:24:41.642344 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/86df3ea4-4d3b-4a58-a69c-ca015e0273d0-xtables-lock\") pod \"kube-proxy-ktv4v\" (UID: \"86df3ea4-4d3b-4a58-a69c-ca015e0273d0\") " pod="kube-system/kube-proxy-ktv4v" Sep 13 00:24:41.642545 kubelet[2224]: I0913 00:24:41.642384 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-cni-bin-dir\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642545 kubelet[2224]: I0913 00:24:41.642431 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-xtables-lock\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642545 kubelet[2224]: I0913 00:24:41.642477 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-var-lib-calico\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642545 kubelet[2224]: I0913 00:24:41.642522 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-var-run-calico\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642831 kubelet[2224]: I0913 00:24:41.642560 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkdtl\" (UniqueName: \"kubernetes.io/projected/f43833be-b860-4dc3-a787-4d7878968390-kube-api-access-lkdtl\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.642831 kubelet[2224]: I0913 00:24:41.642604 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/80a7d795-cb4a-40f8-af15-3eed22f2f4c9-kubelet-dir\") pod \"csi-node-driver-kh44h\" (UID: \"80a7d795-cb4a-40f8-af15-3eed22f2f4c9\") " pod="calico-system/csi-node-driver-kh44h" Sep 13 00:24:41.642831 kubelet[2224]: I0913 00:24:41.642651 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/80a7d795-cb4a-40f8-af15-3eed22f2f4c9-socket-dir\") pod \"csi-node-driver-kh44h\" (UID: \"80a7d795-cb4a-40f8-af15-3eed22f2f4c9\") " pod="calico-system/csi-node-driver-kh44h" Sep 13 00:24:41.642831 kubelet[2224]: I0913 00:24:41.642696 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ptqtm\" (UniqueName: \"kubernetes.io/projected/80a7d795-cb4a-40f8-af15-3eed22f2f4c9-kube-api-access-ptqtm\") pod \"csi-node-driver-kh44h\" (UID: \"80a7d795-cb4a-40f8-af15-3eed22f2f4c9\") " pod="calico-system/csi-node-driver-kh44h" Sep 13 00:24:41.642831 kubelet[2224]: I0913 00:24:41.642745 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f43833be-b860-4dc3-a787-4d7878968390-tigera-ca-bundle\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.643131 kubelet[2224]: I0913 00:24:41.642790 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-cni-log-dir\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.643131 kubelet[2224]: I0913 00:24:41.642831 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-lib-modules\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.643131 kubelet[2224]: I0913 00:24:41.642881 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f43833be-b860-4dc3-a787-4d7878968390-policysync\") pod \"calico-node-f5zvt\" (UID: \"f43833be-b860-4dc3-a787-4d7878968390\") " pod="calico-system/calico-node-f5zvt" Sep 13 00:24:41.751985 kubelet[2224]: I0913 00:24:41.745905 2224 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:24:41.753385 kubelet[2224]: E0913 00:24:41.753353 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.753569 kubelet[2224]: W0913 00:24:41.753543 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.753711 kubelet[2224]: E0913 00:24:41.753687 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.757483 kubelet[2224]: E0913 00:24:41.757053 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.757483 kubelet[2224]: W0913 00:24:41.757092 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.757483 kubelet[2224]: E0913 00:24:41.757133 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.758095 kubelet[2224]: E0913 00:24:41.758061 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.758232 kubelet[2224]: W0913 00:24:41.758207 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.758512 kubelet[2224]: E0913 00:24:41.758485 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.758909 kubelet[2224]: E0913 00:24:41.758887 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.761299 kubelet[2224]: W0913 00:24:41.760289 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.761472 kubelet[2224]: E0913 00:24:41.761440 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.761877 kubelet[2224]: E0913 00:24:41.761845 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.762007 kubelet[2224]: W0913 00:24:41.761875 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.762101 kubelet[2224]: E0913 00:24:41.762066 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.762369 kubelet[2224]: E0913 00:24:41.762341 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.762441 kubelet[2224]: W0913 00:24:41.762367 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.762561 kubelet[2224]: E0913 00:24:41.762526 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.762903 kubelet[2224]: E0913 00:24:41.762858 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.762903 kubelet[2224]: W0913 00:24:41.762887 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.763142 kubelet[2224]: E0913 00:24:41.763117 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.763481 kubelet[2224]: E0913 00:24:41.763452 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.763569 kubelet[2224]: W0913 00:24:41.763479 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.763668 kubelet[2224]: E0913 00:24:41.763635 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.763877 kubelet[2224]: E0913 00:24:41.763852 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.763959 kubelet[2224]: W0913 00:24:41.763877 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.764111 kubelet[2224]: E0913 00:24:41.764086 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.764433 kubelet[2224]: E0913 00:24:41.764406 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.764534 kubelet[2224]: W0913 00:24:41.764445 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.764628 kubelet[2224]: E0913 00:24:41.764594 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.764857 kubelet[2224]: E0913 00:24:41.764831 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.764938 kubelet[2224]: W0913 00:24:41.764856 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.765090 kubelet[2224]: E0913 00:24:41.765066 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.765543 kubelet[2224]: E0913 00:24:41.765514 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.765653 kubelet[2224]: W0913 00:24:41.765541 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.765720 kubelet[2224]: E0913 00:24:41.765692 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.765916 kubelet[2224]: E0913 00:24:41.765890 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.766042 kubelet[2224]: W0913 00:24:41.765915 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.766110 kubelet[2224]: E0913 00:24:41.766090 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.766383 kubelet[2224]: E0913 00:24:41.766358 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.766466 kubelet[2224]: W0913 00:24:41.766382 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.766534 kubelet[2224]: E0913 00:24:41.766519 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.766756 kubelet[2224]: E0913 00:24:41.766731 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.766825 kubelet[2224]: W0913 00:24:41.766758 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.766936 kubelet[2224]: E0913 00:24:41.766903 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.767254 kubelet[2224]: E0913 00:24:41.767227 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.767337 kubelet[2224]: W0913 00:24:41.767253 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.767460 kubelet[2224]: E0913 00:24:41.767418 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.767585 kubelet[2224]: E0913 00:24:41.767551 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.767694 kubelet[2224]: W0913 00:24:41.767670 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.767844 kubelet[2224]: E0913 00:24:41.767808 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.768295 kubelet[2224]: E0913 00:24:41.768275 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.768409 kubelet[2224]: W0913 00:24:41.768386 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.768550 kubelet[2224]: E0913 00:24:41.768515 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.768929 kubelet[2224]: E0913 00:24:41.768909 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.769090 kubelet[2224]: W0913 00:24:41.769067 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.769235 kubelet[2224]: E0913 00:24:41.769200 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.769605 kubelet[2224]: E0913 00:24:41.769585 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.769737 kubelet[2224]: W0913 00:24:41.769711 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.769879 kubelet[2224]: E0913 00:24:41.769844 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.770297 kubelet[2224]: E0913 00:24:41.770277 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.770408 kubelet[2224]: W0913 00:24:41.770384 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.770554 kubelet[2224]: E0913 00:24:41.770518 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.770909 kubelet[2224]: E0913 00:24:41.770889 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.771082 kubelet[2224]: W0913 00:24:41.771055 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.771244 kubelet[2224]: E0913 00:24:41.771211 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.771525 kubelet[2224]: E0913 00:24:41.771498 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.771596 kubelet[2224]: W0913 00:24:41.771524 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.771694 kubelet[2224]: E0913 00:24:41.771661 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.771954 kubelet[2224]: E0913 00:24:41.771928 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.771954 kubelet[2224]: W0913 00:24:41.771952 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.772161 kubelet[2224]: E0913 00:24:41.772095 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.772485 kubelet[2224]: E0913 00:24:41.772458 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.772558 kubelet[2224]: W0913 00:24:41.772487 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.772728 kubelet[2224]: E0913 00:24:41.772700 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.773144 kubelet[2224]: E0913 00:24:41.773117 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.773220 kubelet[2224]: W0913 00:24:41.773143 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.773281 kubelet[2224]: E0913 00:24:41.773249 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.774399 kubelet[2224]: E0913 00:24:41.774366 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.774568 kubelet[2224]: W0913 00:24:41.774540 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.774742 kubelet[2224]: E0913 00:24:41.774699 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.775227 kubelet[2224]: E0913 00:24:41.775202 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.775351 kubelet[2224]: W0913 00:24:41.775326 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.775517 kubelet[2224]: E0913 00:24:41.775479 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.776038 kubelet[2224]: E0913 00:24:41.775952 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.776174 kubelet[2224]: W0913 00:24:41.776150 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.776326 kubelet[2224]: E0913 00:24:41.776288 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.776747 kubelet[2224]: E0913 00:24:41.776725 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.776871 kubelet[2224]: W0913 00:24:41.776847 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.777034 kubelet[2224]: E0913 00:24:41.777000 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.777523 kubelet[2224]: E0913 00:24:41.777499 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.777639 kubelet[2224]: W0913 00:24:41.777615 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.777752 kubelet[2224]: E0913 00:24:41.777728 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.816093 kubelet[2224]: E0913 00:24:41.816054 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.816093 kubelet[2224]: W0913 00:24:41.816087 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.816303 kubelet[2224]: E0913 00:24:41.816118 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.845807 kubelet[2224]: E0913 00:24:41.845773 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.846041 kubelet[2224]: W0913 00:24:41.846003 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.846170 kubelet[2224]: E0913 00:24:41.846146 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.846667 kubelet[2224]: E0913 00:24:41.846645 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.846794 kubelet[2224]: W0913 00:24:41.846770 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.846926 kubelet[2224]: E0913 00:24:41.846903 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.877276 kubelet[2224]: E0913 00:24:41.874638 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.877276 kubelet[2224]: W0913 00:24:41.874677 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.877276 kubelet[2224]: E0913 00:24:41.874711 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.892855 kubelet[2224]: E0913 00:24:41.892821 2224 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:24:41.893076 kubelet[2224]: W0913 00:24:41.893048 2224 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:24:41.893200 kubelet[2224]: E0913 00:24:41.893175 2224 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:24:41.930670 env[1826]: time="2025-09-13T00:24:41.930591003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ktv4v,Uid:86df3ea4-4d3b-4a58-a69c-ca015e0273d0,Namespace:kube-system,Attempt:0,}" Sep 13 00:24:41.952709 env[1826]: time="2025-09-13T00:24:41.952652237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f5zvt,Uid:f43833be-b860-4dc3-a787-4d7878968390,Namespace:calico-system,Attempt:0,}" Sep 13 00:24:42.328367 env[1826]: time="2025-09-13T00:24:42.327703194Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ktv4v,Uid:86df3ea4-4d3b-4a58-a69c-ca015e0273d0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com/containers/images/sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e\": dial tcp: lookup prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com: no such host" Sep 13 00:24:42.330348 kubelet[2224]: E0913 00:24:42.329674 2224 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com/containers/images/sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e\": dial tcp: lookup prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com: no such host" Sep 13 00:24:42.330348 kubelet[2224]: E0913 00:24:42.329803 2224 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com/containers/images/sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e\": dial tcp: lookup prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com: no such host" pod="kube-system/kube-proxy-ktv4v" Sep 13 00:24:42.330348 kubelet[2224]: E0913 00:24:42.329901 2224 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com/containers/images/sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e\": dial tcp: lookup prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com: no such host" pod="kube-system/kube-proxy-ktv4v" Sep 13 00:24:42.330747 kubelet[2224]: E0913 00:24:42.329985 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"kube-proxy-ktv4v_kube-system(86df3ea4-4d3b-4a58-a69c-ca015e0273d0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"kube-proxy-ktv4v_kube-system(86df3ea4-4d3b-4a58-a69c-ca015e0273d0)\\\": rpc error: code = Unknown desc = failed to get sandbox image \\\"registry.k8s.io/pause:3.6\\\": failed to pull image \\\"registry.k8s.io/pause:3.6\\\": failed to pull and unpack image \\\"registry.k8s.io/pause:3.6\\\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \\\"https://prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com/containers/images/sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e\\\": dial tcp: lookup prod-registry-k8s-io-us-west-2.s3.dualstack.us-west-2.amazonaws.com: no such host\"" pod="kube-system/kube-proxy-ktv4v" podUID="86df3ea4-4d3b-4a58-a69c-ca015e0273d0" Sep 13 00:24:42.505269 env[1826]: time="2025-09-13T00:24:42.505210959Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:42.507450 env[1826]: time="2025-09-13T00:24:42.507405253Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:42.510201 env[1826]: time="2025-09-13T00:24:42.510138773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:42.513148 env[1826]: time="2025-09-13T00:24:42.513088822Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:42.548503 env[1826]: time="2025-09-13T00:24:42.548360012Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:24:42.548503 env[1826]: time="2025-09-13T00:24:42.548437244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:24:42.548503 env[1826]: time="2025-09-13T00:24:42.548465355Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:24:42.549389 env[1826]: time="2025-09-13T00:24:42.549291877Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde pid=2313 runtime=io.containerd.runc.v2 Sep 13 00:24:42.581279 systemd[1]: Started cri-containerd-b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde.scope. Sep 13 00:24:42.598192 kubelet[2224]: E0913 00:24:42.598091 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:42.629150 kernel: kauditd_printk_skb: 277 callbacks suppressed Sep 13 00:24:42.629286 kernel: audit: type=1400 audit(1757723082.618:458): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.636829 kernel: audit: type=1400 audit(1757723082.618:459): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.645650 kernel: audit: type=1400 audit(1757723082.618:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.661316 kernel: audit: type=1400 audit(1757723082.618:461): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.661378 kernel: audit: type=1400 audit(1757723082.618:462): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.669258 kernel: audit: type=1400 audit(1757723082.618:463): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.678084 kernel: audit: type=1400 audit(1757723082.618:464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.686179 kernel: audit: type=1400 audit(1757723082.618:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.696003 kernel: audit: type=1400 audit(1757723082.618:466): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.703997 kernel: audit: type=1400 audit(1757723082.618:467): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.618000 audit: BPF prog-id=67 op=LOAD Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2313 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:42.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323236313236346336643730353464633430396337393938366161 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2313 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:42.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323236313236346336643730353464633430396337393938366161 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.628000 audit: BPF prog-id=68 op=LOAD Sep 13 00:24:42.628000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2313 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:42.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323236313236346336643730353464633430396337393938366161 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.637000 audit: BPF prog-id=69 op=LOAD Sep 13 00:24:42.637000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2313 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:42.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323236313236346336643730353464633430396337393938366161 Sep 13 00:24:42.644000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:24:42.644000 audit: BPF prog-id=68 op=UNLOAD Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:42.644000 audit: BPF prog-id=70 op=LOAD Sep 13 00:24:42.644000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2313 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:42.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323236313236346336643730353464633430396337393938366161 Sep 13 00:24:42.708765 env[1826]: time="2025-09-13T00:24:42.708712194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f5zvt,Uid:f43833be-b860-4dc3-a787-4d7878968390,Namespace:calico-system,Attempt:0,} returns sandbox id \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\"" Sep 13 00:24:42.714512 env[1826]: time="2025-09-13T00:24:42.714436133Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:24:42.759938 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1933530052.mount: Deactivated successfully. Sep 13 00:24:43.598981 kubelet[2224]: E0913 00:24:43.598900 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:43.878103 kubelet[2224]: E0913 00:24:43.876445 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:43.885263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1781523571.mount: Deactivated successfully. Sep 13 00:24:44.060708 env[1826]: time="2025-09-13T00:24:44.060654187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:44.065059 env[1826]: time="2025-09-13T00:24:44.065009074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:44.068654 env[1826]: time="2025-09-13T00:24:44.068607448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:44.071050 env[1826]: time="2025-09-13T00:24:44.071000119Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:44.072071 env[1826]: time="2025-09-13T00:24:44.071986360Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 13 00:24:44.077627 env[1826]: time="2025-09-13T00:24:44.077573076Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:24:44.101127 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount920753151.mount: Deactivated successfully. Sep 13 00:24:44.109513 env[1826]: time="2025-09-13T00:24:44.109439487Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05\"" Sep 13 00:24:44.110692 env[1826]: time="2025-09-13T00:24:44.110633451Z" level=info msg="StartContainer for \"b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05\"" Sep 13 00:24:44.154233 systemd[1]: Started cri-containerd-b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05.scope. Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2313 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:44.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613133643231393936643332316434626139346531323836363265 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit: BPF prog-id=71 op=LOAD Sep 13 00:24:44.200000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2313 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:44.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613133643231393936643332316434626139346531323836363265 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit: BPF prog-id=72 op=LOAD Sep 13 00:24:44.200000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2313 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:44.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613133643231393936643332316434626139346531323836363265 Sep 13 00:24:44.200000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:24:44.200000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:44.200000 audit: BPF prog-id=73 op=LOAD Sep 13 00:24:44.200000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2313 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:44.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613133643231393936643332316434626139346531323836363265 Sep 13 00:24:44.231561 env[1826]: time="2025-09-13T00:24:44.231480833Z" level=info msg="StartContainer for \"b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05\" returns successfully" Sep 13 00:24:44.257507 systemd[1]: cri-containerd-b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05.scope: Deactivated successfully. Sep 13 00:24:44.259000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:24:44.326850 env[1826]: time="2025-09-13T00:24:44.326790133Z" level=info msg="shim disconnected" id=b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05 Sep 13 00:24:44.327342 env[1826]: time="2025-09-13T00:24:44.327308930Z" level=warning msg="cleaning up after shim disconnected" id=b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05 namespace=k8s.io Sep 13 00:24:44.327488 env[1826]: time="2025-09-13T00:24:44.327459610Z" level=info msg="cleaning up dead shim" Sep 13 00:24:44.340956 env[1826]: time="2025-09-13T00:24:44.340902273Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:24:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2400 runtime=io.containerd.runc.v2\n" Sep 13 00:24:44.600064 kubelet[2224]: E0913 00:24:44.599338 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:44.807555 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b2a13d21996d321d4ba94e128662e09de2654fb6a01471a7c76a682622d20d05-rootfs.mount: Deactivated successfully. Sep 13 00:24:44.902209 env[1826]: time="2025-09-13T00:24:44.901763543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:24:45.600010 kubelet[2224]: E0913 00:24:45.599899 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:45.876579 kubelet[2224]: E0913 00:24:45.876175 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:46.600932 kubelet[2224]: E0913 00:24:46.600852 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:47.601295 kubelet[2224]: E0913 00:24:47.601233 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:47.879584 kubelet[2224]: E0913 00:24:47.877294 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:48.073819 amazon-ssm-agent[1808]: 2025-09-13 00:24:48 INFO [HealthCheck] HealthCheck reporting agent health. Sep 13 00:24:48.602196 kubelet[2224]: E0913 00:24:48.602129 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:48.691642 env[1826]: time="2025-09-13T00:24:48.691582107Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:48.693909 env[1826]: time="2025-09-13T00:24:48.693862167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:48.700387 env[1826]: time="2025-09-13T00:24:48.700263544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:48.705458 env[1826]: time="2025-09-13T00:24:48.705404410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:48.708190 env[1826]: time="2025-09-13T00:24:48.708116931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 13 00:24:48.712024 env[1826]: time="2025-09-13T00:24:48.711924271Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:24:48.733464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2405252216.mount: Deactivated successfully. Sep 13 00:24:48.740299 env[1826]: time="2025-09-13T00:24:48.740215447Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\"" Sep 13 00:24:48.742252 env[1826]: time="2025-09-13T00:24:48.742203455Z" level=info msg="StartContainer for \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\"" Sep 13 00:24:48.792094 systemd[1]: Started cri-containerd-a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9.scope. Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833320 kernel: kauditd_printk_skb: 91 callbacks suppressed Sep 13 00:24:48.833431 kernel: audit: type=1400 audit(1757723088.830:483): avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2313 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:48.852089 kernel: audit: type=1300 audit(1757723088.830:483): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2313 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:48.852193 kernel: audit: type=1327 audit(1757723088.830:483): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138363631666466306633646366356637316333303839653332353634 Sep 13 00:24:48.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138363631666466306633646366356637316333303839653332353634 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.870310 kernel: audit: type=1400 audit(1757723088.830:484): avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.878256 kernel: audit: type=1400 audit(1757723088.830:484): avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.887458 kernel: audit: type=1400 audit(1757723088.830:484): avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.888008 kernel: audit: type=1400 audit(1757723088.830:484): avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.903415 kernel: audit: type=1400 audit(1757723088.830:484): avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.911197 kernel: audit: type=1400 audit(1757723088.830:484): avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.919274 kernel: audit: type=1400 audit(1757723088.830:484): avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.830000 audit: BPF prog-id=74 op=LOAD Sep 13 00:24:48.830000 audit[2427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2313 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:48.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138363631666466306633646366356637316333303839653332353634 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.833000 audit: BPF prog-id=75 op=LOAD Sep 13 00:24:48.833000 audit[2427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2313 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:48.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138363631666466306633646366356637316333303839653332353634 Sep 13 00:24:48.840000 audit: BPF prog-id=75 op=UNLOAD Sep 13 00:24:48.840000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:48.840000 audit: BPF prog-id=76 op=LOAD Sep 13 00:24:48.840000 audit[2427]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2313 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:48.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138363631666466306633646366356637316333303839653332353634 Sep 13 00:24:48.930531 env[1826]: time="2025-09-13T00:24:48.930473461Z" level=info msg="StartContainer for \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\" returns successfully" Sep 13 00:24:49.603204 kubelet[2224]: E0913 00:24:49.603142 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:49.726753 systemd[1]: run-containerd-runc-k8s.io-a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9-runc.BCWlXK.mount: Deactivated successfully. Sep 13 00:24:49.876499 kubelet[2224]: E0913 00:24:49.876351 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:50.603663 kubelet[2224]: E0913 00:24:50.603594 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:51.604317 kubelet[2224]: E0913 00:24:51.604256 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:51.877344 kubelet[2224]: E0913 00:24:51.877199 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:52.605259 kubelet[2224]: E0913 00:24:52.605214 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:53.605690 kubelet[2224]: E0913 00:24:53.605622 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:53.878117 env[1826]: time="2025-09-13T00:24:53.877938371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ktv4v,Uid:86df3ea4-4d3b-4a58-a69c-ca015e0273d0,Namespace:kube-system,Attempt:0,}" Sep 13 00:24:53.879520 kubelet[2224]: E0913 00:24:53.879464 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:53.909018 env[1826]: time="2025-09-13T00:24:53.908821751Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:24:53.909018 env[1826]: time="2025-09-13T00:24:53.908936590Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:24:53.909342 env[1826]: time="2025-09-13T00:24:53.909021457Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:24:53.909527 env[1826]: time="2025-09-13T00:24:53.909416334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4639f14726f46ec82df608cf8c6f015f585628956472d463a86fe984c27a961f pid=2465 runtime=io.containerd.runc.v2 Sep 13 00:24:53.942202 systemd[1]: Started cri-containerd-4639f14726f46ec82df608cf8c6f015f585628956472d463a86fe984c27a961f.scope. Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987431 kernel: kauditd_printk_skb: 33 callbacks suppressed Sep 13 00:24:53.987545 kernel: audit: type=1400 audit(1757723093.983:489): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.002021 kernel: audit: type=1400 audit(1757723093.983:490): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.002110 kernel: audit: type=1400 audit(1757723093.983:491): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.026084 kernel: audit: type=1400 audit(1757723093.983:492): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.026214 kernel: audit: type=1400 audit(1757723093.983:493): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.035270 kernel: audit: type=1400 audit(1757723093.983:494): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.035427 kernel: audit: type=1400 audit(1757723093.983:495): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.050153 kernel: audit: type=1400 audit(1757723093.983:496): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.050268 kernel: audit: type=1400 audit(1757723093.983:497): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:54.065044 kernel: audit: type=1400 audit(1757723093.984:498): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit: BPF prog-id=77 op=LOAD Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2465 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:53.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333966313437323666343665633832646636303863663863366630 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2465 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:53.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333966313437323666343665633832646636303863663863366630 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.984000 audit: BPF prog-id=78 op=LOAD Sep 13 00:24:53.984000 audit[2474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2465 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:53.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333966313437323666343665633832646636303863663863366630 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.987000 audit: BPF prog-id=79 op=LOAD Sep 13 00:24:53.987000 audit[2474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2465 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:53.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333966313437323666343665633832646636303863663863366630 Sep 13 00:24:53.994000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:24:53.994000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:53.994000 audit: BPF prog-id=80 op=LOAD Sep 13 00:24:53.994000 audit[2474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2465 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:53.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333966313437323666343665633832646636303863663863366630 Sep 13 00:24:54.076373 env[1826]: time="2025-09-13T00:24:54.076319079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ktv4v,Uid:86df3ea4-4d3b-4a58-a69c-ca015e0273d0,Namespace:kube-system,Attempt:0,} returns sandbox id \"4639f14726f46ec82df608cf8c6f015f585628956472d463a86fe984c27a961f\"" Sep 13 00:24:54.079085 env[1826]: time="2025-09-13T00:24:54.079037236Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\"" Sep 13 00:24:54.606761 kubelet[2224]: E0913 00:24:54.606691 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:54.654022 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 13 00:24:54.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:24:54.670000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:24:54.670000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:24:54.670000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:24:55.496703 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1935841565.mount: Deactivated successfully. Sep 13 00:24:55.607117 kubelet[2224]: E0913 00:24:55.607055 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:55.877289 kubelet[2224]: E0913 00:24:55.877218 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:56.384300 env[1826]: time="2025-09-13T00:24:56.384198987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:56.386704 env[1826]: time="2025-09-13T00:24:56.386657337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c15699f0b7002450249485b10f20211982dfd2bec4d61c86c35acebc659e794e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:56.390701 env[1826]: time="2025-09-13T00:24:56.390633742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:56.393168 env[1826]: time="2025-09-13T00:24:56.393119816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:24:56.394098 env[1826]: time="2025-09-13T00:24:56.394036698Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\" returns image reference \"sha256:c15699f0b7002450249485b10f20211982dfd2bec4d61c86c35acebc659e794e\"" Sep 13 00:24:56.398495 env[1826]: time="2025-09-13T00:24:56.398417168Z" level=info msg="CreateContainer within sandbox \"4639f14726f46ec82df608cf8c6f015f585628956472d463a86fe984c27a961f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:24:56.418098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount413209291.mount: Deactivated successfully. Sep 13 00:24:56.430891 env[1826]: time="2025-09-13T00:24:56.430807768Z" level=info msg="CreateContainer within sandbox \"4639f14726f46ec82df608cf8c6f015f585628956472d463a86fe984c27a961f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fcc34f411715d46ed18cd3c32217b75ddc3df67eba687bfa033e5256527a12a4\"" Sep 13 00:24:56.432115 env[1826]: time="2025-09-13T00:24:56.432006609Z" level=info msg="StartContainer for \"fcc34f411715d46ed18cd3c32217b75ddc3df67eba687bfa033e5256527a12a4\"" Sep 13 00:24:56.469250 systemd[1]: Started cri-containerd-fcc34f411715d46ed18cd3c32217b75ddc3df67eba687bfa033e5256527a12a4.scope. Sep 13 00:24:56.518000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.518000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2465 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633334663431313731356434366564313863643363333232313762 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.519000 audit: BPF prog-id=81 op=LOAD Sep 13 00:24:56.519000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2465 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633334663431313731356434366564313863643363333232313762 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.521000 audit: BPF prog-id=82 op=LOAD Sep 13 00:24:56.521000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2465 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633334663431313731356434366564313863643363333232313762 Sep 13 00:24:56.523000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:24:56.523000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:24:56.523000 audit: BPF prog-id=83 op=LOAD Sep 13 00:24:56.523000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2465 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633334663431313731356434366564313863643363333232313762 Sep 13 00:24:56.553863 env[1826]: time="2025-09-13T00:24:56.553801376Z" level=info msg="StartContainer for \"fcc34f411715d46ed18cd3c32217b75ddc3df67eba687bfa033e5256527a12a4\" returns successfully" Sep 13 00:24:56.607406 kubelet[2224]: E0913 00:24:56.607337 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:56.797000 audit[2572]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2572 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:56.797000 audit[2572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6cce940 a2=0 a3=1 items=0 ppid=2520 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:24:56.799000 audit[2571]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.799000 audit[2571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdddb5930 a2=0 a3=1 items=0 ppid=2520 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:24:56.799000 audit[2573]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2573 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:56.799000 audit[2573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc3d8f60 a2=0 a3=1 items=0 ppid=2520 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:24:56.801000 audit[2574]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:56.801000 audit[2574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd21c4320 a2=0 a3=1 items=0 ppid=2520 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:24:56.802000 audit[2575]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.802000 audit[2575]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc74ec0a0 a2=0 a3=1 items=0 ppid=2520 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:24:56.807000 audit[2576]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.807000 audit[2576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1e29ec0 a2=0 a3=1 items=0 ppid=2520 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:24:56.910000 audit[2577]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.910000 audit[2577]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff8d7caf0 a2=0 a3=1 items=0 ppid=2520 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:24:56.915000 audit[2579]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.915000 audit[2579]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd64e8b70 a2=0 a3=1 items=0 ppid=2520 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:24:56.922000 audit[2582]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.922000 audit[2582]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd41429f0 a2=0 a3=1 items=0 ppid=2520 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:24:56.925000 audit[2583]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.925000 audit[2583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec699430 a2=0 a3=1 items=0 ppid=2520 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.925000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:24:56.930000 audit[2585]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.930000 audit[2585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff23e32f0 a2=0 a3=1 items=0 ppid=2520 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:24:56.933000 audit[2586]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.933000 audit[2586]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9a47670 a2=0 a3=1 items=0 ppid=2520 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:24:56.938000 audit[2588]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.938000 audit[2588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc833a540 a2=0 a3=1 items=0 ppid=2520 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:24:56.945000 audit[2591]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.945000 audit[2591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc00d5ff0 a2=0 a3=1 items=0 ppid=2520 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:24:56.948000 audit[2592]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.948000 audit[2592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc5280f0 a2=0 a3=1 items=0 ppid=2520 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:24:56.956000 audit[2594]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.956000 audit[2594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7515e80 a2=0 a3=1 items=0 ppid=2520 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:24:56.959000 audit[2595]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.959000 audit[2595]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa92f6c0 a2=0 a3=1 items=0 ppid=2520 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:24:56.965000 audit[2597]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.965000 audit[2597]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe0dca580 a2=0 a3=1 items=0 ppid=2520 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:24:56.972000 audit[2600]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.972000 audit[2600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff9a26fc0 a2=0 a3=1 items=0 ppid=2520 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:24:56.981000 audit[2603]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.981000 audit[2603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeed05f60 a2=0 a3=1 items=0 ppid=2520 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:24:56.984000 audit[2604]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.984000 audit[2604]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffddbeb40 a2=0 a3=1 items=0 ppid=2520 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:24:56.988000 audit[2606]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:56.988000 audit[2606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffea5e0dd0 a2=0 a3=1 items=0 ppid=2520 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:56.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:24:57.038000 audit[2610]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2610 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:57.038000 audit[2610]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc6dc5e60 a2=0 a3=1 items=0 ppid=2520 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:24:57.041000 audit[2611]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2611 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:57.041000 audit[2611]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5f6e7e0 a2=0 a3=1 items=0 ppid=2520 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:24:57.046000 audit[2613]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:24:57.046000 audit[2613]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff34365b0 a2=0 a3=1 items=0 ppid=2520 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:24:57.102000 audit[2619]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:24:57.102000 audit[2619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffc84f130 a2=0 a3=1 items=0 ppid=2520 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:57.155000 audit[2619]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:24:57.155000 audit[2619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29052 a0=3 a1=fffffc84f130 a2=0 a3=1 items=0 ppid=2520 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.155000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:57.174000 audit[2629]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.174000 audit[2629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd1267990 a2=0 a3=1 items=0 ppid=2520 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:24:57.179000 audit[2631]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.179000 audit[2631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd0d43dd0 a2=0 a3=1 items=0 ppid=2520 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:24:57.186000 audit[2634]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.186000 audit[2634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5ccb5e0 a2=0 a3=1 items=0 ppid=2520 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:24:57.189000 audit[2635]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.189000 audit[2635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd58cbd0 a2=0 a3=1 items=0 ppid=2520 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:24:57.193000 audit[2637]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.193000 audit[2637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcd7db010 a2=0 a3=1 items=0 ppid=2520 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:24:57.196000 audit[2638]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2638 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.196000 audit[2638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef47d680 a2=0 a3=1 items=0 ppid=2520 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:24:57.201000 audit[2640]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.201000 audit[2640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdc5bb740 a2=0 a3=1 items=0 ppid=2520 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:24:57.208000 audit[2643]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.208000 audit[2643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff256b7b0 a2=0 a3=1 items=0 ppid=2520 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:24:57.210000 audit[2644]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2644 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.210000 audit[2644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3517880 a2=0 a3=1 items=0 ppid=2520 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:24:57.216000 audit[2646]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.216000 audit[2646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffff10d640 a2=0 a3=1 items=0 ppid=2520 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:24:57.218000 audit[2647]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.218000 audit[2647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3326e30 a2=0 a3=1 items=0 ppid=2520 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:24:57.223000 audit[2649]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.223000 audit[2649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd68a4fb0 a2=0 a3=1 items=0 ppid=2520 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:24:57.231000 audit[2652]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.231000 audit[2652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcb93a2a0 a2=0 a3=1 items=0 ppid=2520 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:24:57.238000 audit[2655]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.238000 audit[2655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9b66a90 a2=0 a3=1 items=0 ppid=2520 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:24:57.240000 audit[2656]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.240000 audit[2656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcbf1b240 a2=0 a3=1 items=0 ppid=2520 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:24:57.245000 audit[2658]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.245000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff05524d0 a2=0 a3=1 items=0 ppid=2520 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:24:57.254000 audit[2661]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.254000 audit[2661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff83d7a70 a2=0 a3=1 items=0 ppid=2520 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:24:57.256000 audit[2662]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2662 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.256000 audit[2662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0876b80 a2=0 a3=1 items=0 ppid=2520 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:24:57.261000 audit[2664]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.261000 audit[2664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe4646fe0 a2=0 a3=1 items=0 ppid=2520 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:24:57.263000 audit[2665]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.263000 audit[2665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb2c7510 a2=0 a3=1 items=0 ppid=2520 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:24:57.268000 audit[2667]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.268000 audit[2667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff9ed9c40 a2=0 a3=1 items=0 ppid=2520 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:24:57.275000 audit[2670]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:24:57.275000 audit[2670]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd35a9a30 a2=0 a3=1 items=0 ppid=2520 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:24:57.282000 audit[2672]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:24:57.282000 audit[2672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc1c30d00 a2=0 a3=1 items=0 ppid=2520 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.282000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:57.283000 audit[2672]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:24:57.283000 audit[2672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc1c30d00 a2=0 a3=1 items=0 ppid=2520 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.283000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:57.592000 audit[2674]: NETFILTER_CFG table=filter:65 family=2 entries=11 op=nft_register_rule pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:24:57.592000 audit[2674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc5497660 a2=0 a3=1 items=0 ppid=2520 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:57.604000 audit[2674]: NETFILTER_CFG table=nat:66 family=2 entries=29 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:24:57.604000 audit[2674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffc5497660 a2=0 a3=1 items=0 ppid=2520 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:57.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:57.609137 kubelet[2224]: E0913 00:24:57.609076 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:57.877431 kubelet[2224]: E0913 00:24:57.877282 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:24:58.610051 kubelet[2224]: E0913 00:24:58.610002 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:58.974000 audit[2676]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:24:58.974000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffde21d3f0 a2=0 a3=1 items=0 ppid=2520 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:58.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:58.982000 audit[2676]: NETFILTER_CFG table=nat:68 family=2 entries=24 op=nft_register_rule pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:24:58.982000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffde21d3f0 a2=0 a3=1 items=0 ppid=2520 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:24:58.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:24:59.597310 kubelet[2224]: E0913 00:24:59.597242 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:59.611166 kubelet[2224]: E0913 00:24:59.611123 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:24:59.877095 kubelet[2224]: E0913 00:24:59.876937 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:00.612167 kubelet[2224]: E0913 00:25:00.612105 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:01.612795 kubelet[2224]: E0913 00:25:01.612760 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:01.877363 kubelet[2224]: E0913 00:25:01.877220 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:02.614489 kubelet[2224]: E0913 00:25:02.614421 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:03.615263 kubelet[2224]: E0913 00:25:03.615223 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:03.878904 kubelet[2224]: E0913 00:25:03.878768 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:04.616772 kubelet[2224]: E0913 00:25:04.616735 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:05.618266 kubelet[2224]: E0913 00:25:05.618220 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:05.877658 kubelet[2224]: E0913 00:25:05.877375 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:05.969679 amazon-ssm-agent[1808]: 2025-09-13 00:25:05 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Sep 13 00:25:06.619391 kubelet[2224]: E0913 00:25:06.619356 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:07.620984 kubelet[2224]: E0913 00:25:07.620911 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:07.877352 kubelet[2224]: E0913 00:25:07.876909 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:08.621286 kubelet[2224]: E0913 00:25:08.621235 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:09.423549 update_engine[1820]: I0913 00:25:09.423484 1820 update_attempter.cc:509] Updating boot flags... Sep 13 00:25:09.622179 kubelet[2224]: E0913 00:25:09.622079 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:09.876870 kubelet[2224]: E0913 00:25:09.876654 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:10.623019 kubelet[2224]: E0913 00:25:10.622960 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:11.624086 kubelet[2224]: E0913 00:25:11.624025 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:11.877549 kubelet[2224]: E0913 00:25:11.877171 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:12.624516 kubelet[2224]: E0913 00:25:12.624448 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:13.481054 kernel: kauditd_printk_skb: 259 callbacks suppressed Sep 13 00:25:13.481289 kernel: audit: type=1325 audit(1757723113.477:572): table=filter:69 family=2 entries=10 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:13.477000 audit[2945]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:13.477000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc9a97640 a2=0 a3=1 items=0 ppid=2520 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:13.497593 kernel: audit: type=1300 audit(1757723113.477:572): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc9a97640 a2=0 a3=1 items=0 ppid=2520 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:13.497652 kernel: audit: type=1327 audit(1757723113.477:572): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:13.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:13.505000 audit[2945]: NETFILTER_CFG table=nat:70 family=2 entries=36 op=nft_register_chain pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:13.505000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffc9a97640 a2=0 a3=1 items=0 ppid=2520 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:13.524136 kernel: audit: type=1325 audit(1757723113.505:573): table=nat:70 family=2 entries=36 op=nft_register_chain pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:13.524219 kernel: audit: type=1300 audit(1757723113.505:573): arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffc9a97640 a2=0 a3=1 items=0 ppid=2520 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:13.524286 kernel: audit: type=1327 audit(1757723113.505:573): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:13.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:13.624869 kubelet[2224]: E0913 00:25:13.624813 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:13.877385 kubelet[2224]: E0913 00:25:13.877316 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:14.625291 kubelet[2224]: E0913 00:25:14.625236 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:15.625500 kubelet[2224]: E0913 00:25:15.625444 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:15.877287 kubelet[2224]: E0913 00:25:15.876691 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:16.626268 kubelet[2224]: E0913 00:25:16.626212 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:17.627254 kubelet[2224]: E0913 00:25:17.627217 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:17.876415 kubelet[2224]: E0913 00:25:17.876350 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:18.628273 kubelet[2224]: E0913 00:25:18.628234 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:19.597153 kubelet[2224]: E0913 00:25:19.597105 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:19.629884 kubelet[2224]: E0913 00:25:19.629830 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:19.877591 kubelet[2224]: E0913 00:25:19.877132 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:20.228443 systemd[1]: cri-containerd-a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9.scope: Deactivated successfully. Sep 13 00:25:20.229033 systemd[1]: cri-containerd-a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9.scope: Consumed 1.155s CPU time. Sep 13 00:25:20.230000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:25:20.235027 kernel: audit: type=1334 audit(1757723120.230:574): prog-id=76 op=UNLOAD Sep 13 00:25:20.265403 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9-rootfs.mount: Deactivated successfully. Sep 13 00:25:20.451743 env[1826]: time="2025-09-13T00:25:20.451680486Z" level=info msg="shim disconnected" id=a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9 Sep 13 00:25:20.452538 env[1826]: time="2025-09-13T00:25:20.452484307Z" level=warning msg="cleaning up after shim disconnected" id=a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9 namespace=k8s.io Sep 13 00:25:20.452671 env[1826]: time="2025-09-13T00:25:20.452642558Z" level=info msg="cleaning up dead shim" Sep 13 00:25:20.466842 env[1826]: time="2025-09-13T00:25:20.466785872Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:25:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2958 runtime=io.containerd.runc.v2\n" Sep 13 00:25:20.630907 kubelet[2224]: E0913 00:25:20.630858 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:21.005235 env[1826]: time="2025-09-13T00:25:21.005088087Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for container &ContainerMetadata{Name:install-cni,Attempt:1,}" Sep 13 00:25:21.031176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount202640801.mount: Deactivated successfully. Sep 13 00:25:21.037701 env[1826]: time="2025-09-13T00:25:21.037615291Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for &ContainerMetadata{Name:install-cni,Attempt:1,} returns container id \"c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d\"" Sep 13 00:25:21.038928 env[1826]: time="2025-09-13T00:25:21.038879967Z" level=info msg="StartContainer for \"c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d\"" Sep 13 00:25:21.041905 kubelet[2224]: I0913 00:25:21.041828 2224 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ktv4v" podStartSLOduration=39.723892536 podStartE2EDuration="42.041782488s" podCreationTimestamp="2025-09-13 00:24:39 +0000 UTC" firstStartedPulling="2025-09-13 00:24:54.078287011 +0000 UTC m=+15.705165238" lastFinishedPulling="2025-09-13 00:24:56.396176975 +0000 UTC m=+18.023055190" observedRunningTime="2025-09-13 00:24:56.977563219 +0000 UTC m=+18.604441458" watchObservedRunningTime="2025-09-13 00:25:21.041782488 +0000 UTC m=+42.668660727" Sep 13 00:25:21.102135 systemd[1]: Started cri-containerd-c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d.scope. Sep 13 00:25:21.139000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.139000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2313 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:21.160086 kernel: audit: type=1400 audit(1757723121.139:575): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.160200 kernel: audit: type=1300 audit(1757723121.139:575): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2313 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353239353732313134386563623035313664636566316532616130 Sep 13 00:25:21.173150 kernel: audit: type=1327 audit(1757723121.139:575): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353239353732313134386563623035313664636566316532616130 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.180758 kernel: audit: type=1400 audit(1757723121.146:576): avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.180987 kernel: audit: type=1400 audit(1757723121.146:576): avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.196826 kernel: audit: type=1400 audit(1757723121.146:576): avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.206355 kernel: audit: type=1400 audit(1757723121.146:576): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.214098 kernel: audit: type=1400 audit(1757723121.146:576): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.222520 kernel: audit: type=1400 audit(1757723121.146:576): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.146000 audit: BPF prog-id=84 op=LOAD Sep 13 00:25:21.146000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2313 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:21.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353239353732313134386563623035313664636566316532616130 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit: BPF prog-id=85 op=LOAD Sep 13 00:25:21.147000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2313 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:21.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353239353732313134386563623035313664636566316532616130 Sep 13 00:25:21.147000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:25:21.147000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:21.147000 audit: BPF prog-id=86 op=LOAD Sep 13 00:25:21.147000 audit[2979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2313 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:21.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353239353732313134386563623035313664636566316532616130 Sep 13 00:25:21.229262 env[1826]: time="2025-09-13T00:25:21.229196978Z" level=info msg="StartContainer for \"c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d\" returns successfully" Sep 13 00:25:21.268151 systemd[1]: run-containerd-runc-k8s.io-c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d-runc.eGMrJA.mount: Deactivated successfully. Sep 13 00:25:21.631408 kubelet[2224]: E0913 00:25:21.631331 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:21.877299 kubelet[2224]: E0913 00:25:21.876748 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:22.095621 env[1826]: time="2025-09-13T00:25:22.095545774Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:25:22.102278 systemd[1]: cri-containerd-c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d.scope: Deactivated successfully. Sep 13 00:25:22.102725 systemd[1]: cri-containerd-c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d.scope: Consumed 1.200s CPU time. Sep 13 00:25:22.106000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:25:22.138027 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d-rootfs.mount: Deactivated successfully. Sep 13 00:25:22.150673 env[1826]: time="2025-09-13T00:25:22.150597715Z" level=info msg="shim disconnected" id=c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d Sep 13 00:25:22.150673 env[1826]: time="2025-09-13T00:25:22.150666598Z" level=warning msg="cleaning up after shim disconnected" id=c85295721148ecb0516dcef1e2aa0a95edfac3f57c28a18a16ddd15fcf129a3d namespace=k8s.io Sep 13 00:25:22.151081 env[1826]: time="2025-09-13T00:25:22.150689495Z" level=info msg="cleaning up dead shim" Sep 13 00:25:22.165232 env[1826]: time="2025-09-13T00:25:22.165157661Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:25:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3019 runtime=io.containerd.runc.v2\n" Sep 13 00:25:22.187438 kubelet[2224]: I0913 00:25:22.186263 2224 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 13 00:25:22.632427 kubelet[2224]: E0913 00:25:22.632374 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:23.011548 kubelet[2224]: I0913 00:25:23.011152 2224 scope.go:117] "RemoveContainer" containerID="a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9" Sep 13 00:25:23.011753 kubelet[2224]: I0913 00:25:23.011691 2224 scope.go:117] "RemoveContainer" containerID="a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9" Sep 13 00:25:23.014501 env[1826]: time="2025-09-13T00:25:23.014230138Z" level=info msg="RemoveContainer for \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\"" Sep 13 00:25:23.016408 env[1826]: time="2025-09-13T00:25:23.016350097Z" level=info msg="RemoveContainer for \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\"" Sep 13 00:25:23.016565 env[1826]: time="2025-09-13T00:25:23.016511180Z" level=error msg="RemoveContainer for \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\" failed" error="failed to set removing state for container \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\": container is already in removing state" Sep 13 00:25:23.017177 kubelet[2224]: E0913 00:25:23.017034 2224 log.go:32] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\": container is already in removing state" containerID="a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9" Sep 13 00:25:23.017177 kubelet[2224]: E0913 00:25:23.017121 2224 kuberuntime_container.go:896] "Unhandled Error" err="failed to remove pod init container \"install-cni\": rpc error: code = Unknown desc = failed to set removing state for container \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\": container is already in removing state; Skipping pod \"calico-node-f5zvt_calico-system(f43833be-b860-4dc3-a787-4d7878968390)\"" logger="UnhandledError" Sep 13 00:25:23.019625 env[1826]: time="2025-09-13T00:25:23.019555297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:25:23.021518 env[1826]: time="2025-09-13T00:25:23.021456283Z" level=info msg="RemoveContainer for \"a8661fdf0f3dcf5f71c3089e325643afd8bfae4acc88c71bce559b046a60c2e9\" returns successfully" Sep 13 00:25:23.342000 audit[3033]: NETFILTER_CFG table=filter:71 family=2 entries=9 op=nft_register_rule pid=3033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:23.342000 audit[3033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd2f1f3e0 a2=0 a3=1 items=0 ppid=2520 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:23.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:23.350000 audit[3033]: NETFILTER_CFG table=nat:72 family=2 entries=31 op=nft_register_chain pid=3033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:23.350000 audit[3033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffd2f1f3e0 a2=0 a3=1 items=0 ppid=2520 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:23.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:23.633370 kubelet[2224]: E0913 00:25:23.633225 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:23.885621 systemd[1]: Created slice kubepods-besteffort-pod80a7d795_cb4a_40f8_af15_3eed22f2f4c9.slice. Sep 13 00:25:23.891269 env[1826]: time="2025-09-13T00:25:23.891193574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kh44h,Uid:80a7d795-cb4a-40f8-af15-3eed22f2f4c9,Namespace:calico-system,Attempt:0,}" Sep 13 00:25:24.044901 env[1826]: time="2025-09-13T00:25:24.044828284Z" level=error msg="Failed to destroy network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:24.047893 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8-shm.mount: Deactivated successfully. Sep 13 00:25:24.050085 env[1826]: time="2025-09-13T00:25:24.049933874Z" level=error msg="encountered an error cleaning up failed sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:24.050335 env[1826]: time="2025-09-13T00:25:24.050284420Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kh44h,Uid:80a7d795-cb4a-40f8-af15-3eed22f2f4c9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:24.050749 kubelet[2224]: E0913 00:25:24.050685 2224 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:24.050860 kubelet[2224]: E0913 00:25:24.050769 2224 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kh44h" Sep 13 00:25:24.050860 kubelet[2224]: E0913 00:25:24.050808 2224 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kh44h" Sep 13 00:25:24.051057 kubelet[2224]: E0913 00:25:24.050866 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kh44h_calico-system(80a7d795-cb4a-40f8-af15-3eed22f2f4c9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kh44h_calico-system(80a7d795-cb4a-40f8-af15-3eed22f2f4c9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:24.634318 kubelet[2224]: E0913 00:25:24.634250 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:25.021218 kubelet[2224]: I0913 00:25:25.020788 2224 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:25.022295 env[1826]: time="2025-09-13T00:25:25.022245429Z" level=info msg="StopPodSandbox for \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\"" Sep 13 00:25:25.090610 env[1826]: time="2025-09-13T00:25:25.090528588Z" level=error msg="StopPodSandbox for \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\" failed" error="failed to destroy network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:25.091088 kubelet[2224]: E0913 00:25:25.091013 2224 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:25.091214 kubelet[2224]: E0913 00:25:25.091107 2224 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8"} Sep 13 00:25:25.091214 kubelet[2224]: E0913 00:25:25.091191 2224 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"80a7d795-cb4a-40f8-af15-3eed22f2f4c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:25:25.091390 kubelet[2224]: E0913 00:25:25.091230 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"80a7d795-cb4a-40f8-af15-3eed22f2f4c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kh44h" podUID="80a7d795-cb4a-40f8-af15-3eed22f2f4c9" Sep 13 00:25:25.635147 kubelet[2224]: E0913 00:25:25.635095 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:26.225879 systemd[1]: Created slice kubepods-besteffort-poddb46b9e1_c6ff_4c15_b3bb_5c46b14eeca2.slice. Sep 13 00:25:26.347295 kubelet[2224]: I0913 00:25:26.347203 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wl6wr\" (UniqueName: \"kubernetes.io/projected/db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2-kube-api-access-wl6wr\") pod \"nginx-deployment-8587fbcb89-h22fw\" (UID: \"db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2\") " pod="default/nginx-deployment-8587fbcb89-h22fw" Sep 13 00:25:26.534548 env[1826]: time="2025-09-13T00:25:26.534080595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-h22fw,Uid:db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2,Namespace:default,Attempt:0,}" Sep 13 00:25:26.636075 kubelet[2224]: E0913 00:25:26.635993 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:26.696194 env[1826]: time="2025-09-13T00:25:26.696123744Z" level=error msg="Failed to destroy network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:26.700235 env[1826]: time="2025-09-13T00:25:26.700159745Z" level=error msg="encountered an error cleaning up failed sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:26.701152 env[1826]: time="2025-09-13T00:25:26.701071179Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-h22fw,Uid:db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:26.703198 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18-shm.mount: Deactivated successfully. Sep 13 00:25:26.705166 kubelet[2224]: E0913 00:25:26.704943 2224 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:26.705166 kubelet[2224]: E0913 00:25:26.705054 2224 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-h22fw" Sep 13 00:25:26.705166 kubelet[2224]: E0913 00:25:26.705093 2224 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-h22fw" Sep 13 00:25:26.705480 kubelet[2224]: E0913 00:25:26.705172 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-h22fw_default(db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-h22fw_default(db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-h22fw" podUID="db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2" Sep 13 00:25:27.026857 kubelet[2224]: I0913 00:25:27.025767 2224 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:27.027193 env[1826]: time="2025-09-13T00:25:27.027133090Z" level=info msg="StopPodSandbox for \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\"" Sep 13 00:25:27.083095 env[1826]: time="2025-09-13T00:25:27.083009337Z" level=error msg="StopPodSandbox for \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\" failed" error="failed to destroy network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:25:27.083920 kubelet[2224]: E0913 00:25:27.083600 2224 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:27.083920 kubelet[2224]: E0913 00:25:27.083709 2224 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18"} Sep 13 00:25:27.083920 kubelet[2224]: E0913 00:25:27.083794 2224 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:25:27.083920 kubelet[2224]: E0913 00:25:27.083857 2224 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-h22fw" podUID="db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2" Sep 13 00:25:27.636212 kubelet[2224]: E0913 00:25:27.636138 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:28.636935 kubelet[2224]: E0913 00:25:28.636886 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:29.638224 kubelet[2224]: E0913 00:25:29.638136 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:30.638390 kubelet[2224]: E0913 00:25:30.638297 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:31.639222 kubelet[2224]: E0913 00:25:31.639125 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:32.639688 kubelet[2224]: E0913 00:25:32.639625 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:32.886523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3436504431.mount: Deactivated successfully. Sep 13 00:25:32.938423 env[1826]: time="2025-09-13T00:25:32.937886350Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:32.940723 env[1826]: time="2025-09-13T00:25:32.940661098Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:32.943378 env[1826]: time="2025-09-13T00:25:32.943333448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:32.946720 env[1826]: time="2025-09-13T00:25:32.946675802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:32.948082 env[1826]: time="2025-09-13T00:25:32.948028927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 13 00:25:32.976160 env[1826]: time="2025-09-13T00:25:32.976105068Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:25:32.999324 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2546174748.mount: Deactivated successfully. Sep 13 00:25:33.004803 env[1826]: time="2025-09-13T00:25:33.004731747Z" level=info msg="CreateContainer within sandbox \"b72261264c6d7054dc409c79986aa51090c86407ddf95794109fc497cc91cdde\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0\"" Sep 13 00:25:33.005704 env[1826]: time="2025-09-13T00:25:33.005657742Z" level=info msg="StartContainer for \"10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0\"" Sep 13 00:25:33.035918 systemd[1]: Started cri-containerd-10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0.scope. Sep 13 00:25:33.086000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.089103 kernel: kauditd_printk_skb: 41 callbacks suppressed Sep 13 00:25:33.089224 kernel: audit: type=1400 audit(1757723133.086:584): avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.086000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2313 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:33.107846 kernel: audit: type=1300 audit(1757723133.086:584): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2313 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:33.107937 kernel: audit: type=1327 audit(1757723133.086:584): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643962346233326534633161653962666238633064656538306631 Sep 13 00:25:33.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643962346233326534633161653962666238633064656538306631 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.125598 kernel: audit: type=1400 audit(1757723133.090:585): avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.125717 kernel: audit: type=1400 audit(1757723133.090:585): avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.140437 kernel: audit: type=1400 audit(1757723133.090:585): avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.148584 kernel: audit: type=1400 audit(1757723133.090:585): avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.148725 kernel: audit: type=1400 audit(1757723133.090:585): avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.164244 kernel: audit: type=1400 audit(1757723133.090:585): avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.164333 kernel: audit: type=1400 audit(1757723133.090:585): avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.168517 env[1826]: time="2025-09-13T00:25:33.168457719Z" level=info msg="StartContainer for \"10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0\" returns successfully" Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.090000 audit: BPF prog-id=87 op=LOAD Sep 13 00:25:33.090000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2313 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:33.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643962346233326534633161653962666238633064656538306631 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.095000 audit: BPF prog-id=88 op=LOAD Sep 13 00:25:33.095000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2313 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:33.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643962346233326534633161653962666238633064656538306631 Sep 13 00:25:33.107000 audit: BPF prog-id=88 op=UNLOAD Sep 13 00:25:33.107000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:33.107000 audit: BPF prog-id=89 op=LOAD Sep 13 00:25:33.107000 audit[3129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2313 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:33.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643962346233326534633161653962666238633064656538306631 Sep 13 00:25:33.543649 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:25:33.543829 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:25:33.640738 kubelet[2224]: E0913 00:25:33.640642 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:34.094093 systemd[1]: run-containerd-runc-k8s.io-10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0-runc.la91NH.mount: Deactivated successfully. Sep 13 00:25:34.641666 kubelet[2224]: E0913 00:25:34.641606 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:35.001000 audit[3247]: AVC avc: denied { write } for pid=3247 comm="tee" name="fd" dev="proc" ino=16821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:25:35.001000 audit[3247]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6a277da a2=241 a3=1b6 items=1 ppid=3216 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.001000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:25:35.001000 audit: PATH item=0 name="/dev/fd/63" inode=16811 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:25:35.001000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:25:35.014000 audit[3263]: AVC avc: denied { write } for pid=3263 comm="tee" name="fd" dev="proc" ino=16830 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:25:35.026000 audit[3273]: AVC avc: denied { write } for pid=3273 comm="tee" name="fd" dev="proc" ino=16020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:25:35.027000 audit[3257]: AVC avc: denied { write } for pid=3257 comm="tee" name="fd" dev="proc" ino=16023 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:25:35.030000 audit[3281]: AVC avc: denied { write } for pid=3281 comm="tee" name="fd" dev="proc" ino=16838 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:25:35.030000 audit[3279]: AVC avc: denied { write } for pid=3279 comm="tee" name="fd" dev="proc" ino=16026 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:25:35.030000 audit[3281]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde1037da a2=241 a3=1b6 items=1 ppid=3219 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.030000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:25:35.030000 audit: PATH item=0 name="/dev/fd/63" inode=16832 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:25:35.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:25:35.014000 audit[3263]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff23837db a2=241 a3=1b6 items=1 ppid=3217 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.014000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:25:35.014000 audit: PATH item=0 name="/dev/fd/63" inode=16823 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:25:35.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:25:35.027000 audit[3257]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff96f7da a2=241 a3=1b6 items=1 ppid=3227 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.027000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:25:35.027000 audit: PATH item=0 name="/dev/fd/63" inode=16818 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:25:35.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:25:35.036000 audit[3265]: AVC avc: denied { write } for pid=3265 comm="tee" name="fd" dev="proc" ino=16030 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:25:35.026000 audit[3273]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff25967dc a2=241 a3=1b6 items=1 ppid=3230 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.026000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:25:35.026000 audit: PATH item=0 name="/dev/fd/63" inode=16012 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:25:35.026000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:25:35.036000 audit[3265]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff96a27cb a2=241 a3=1b6 items=1 ppid=3220 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.036000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:25:35.036000 audit: PATH item=0 name="/dev/fd/63" inode=16010 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:25:35.036000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:25:35.030000 audit[3279]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6ea47ca a2=241 a3=1b6 items=1 ppid=3226 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.030000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:25:35.030000 audit: PATH item=0 name="/dev/fd/63" inode=16016 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:25:35.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:25:35.138575 systemd[1]: run-containerd-runc-k8s.io-10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0-runc.WXwCd2.mount: Deactivated successfully. Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit: BPF prog-id=90 op=LOAD Sep 13 00:25:35.517000 audit[3325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc9f1748 a2=98 a3=ffffcc9f1738 items=0 ppid=3228 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.517000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:25:35.517000 audit: BPF prog-id=90 op=UNLOAD Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.517000 audit: BPF prog-id=91 op=LOAD Sep 13 00:25:35.517000 audit[3325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc9f15f8 a2=74 a3=95 items=0 ppid=3228 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.517000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:25:35.518000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit: BPF prog-id=92 op=LOAD Sep 13 00:25:35.518000 audit[3325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcc9f1628 a2=40 a3=ffffcc9f1658 items=0 ppid=3228 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.518000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:25:35.518000 audit: BPF prog-id=92 op=UNLOAD Sep 13 00:25:35.518000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.518000 audit[3325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffcc9f1740 a2=50 a3=0 items=0 ppid=3228 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.518000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit: BPF prog-id=93 op=LOAD Sep 13 00:25:35.533000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe44a1628 a2=98 a3=ffffe44a1618 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.533000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.533000 audit: BPF prog-id=93 op=UNLOAD Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.533000 audit: BPF prog-id=94 op=LOAD Sep 13 00:25:35.533000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe44a12b8 a2=74 a3=95 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.533000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.534000 audit: BPF prog-id=94 op=UNLOAD Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.534000 audit: BPF prog-id=95 op=LOAD Sep 13 00:25:35.534000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe44a1318 a2=94 a3=2 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.534000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.534000 audit: BPF prog-id=95 op=UNLOAD Sep 13 00:25:35.642457 kubelet[2224]: E0913 00:25:35.642390 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit: BPF prog-id=96 op=LOAD Sep 13 00:25:35.744000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe44a12d8 a2=40 a3=ffffe44a1308 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.744000 audit: BPF prog-id=96 op=UNLOAD Sep 13 00:25:35.744000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.744000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe44a13f0 a2=50 a3=0 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe44a1348 a2=28 a3=ffffe44a1478 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe44a1378 a2=28 a3=ffffe44a14a8 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe44a1228 a2=28 a3=ffffe44a1358 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe44a1398 a2=28 a3=ffffe44a14c8 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe44a1378 a2=28 a3=ffffe44a14a8 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe44a1368 a2=28 a3=ffffe44a1498 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe44a1398 a2=28 a3=ffffe44a14c8 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe44a1378 a2=28 a3=ffffe44a14a8 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe44a1398 a2=28 a3=ffffe44a14c8 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe44a1368 a2=28 a3=ffffe44a1498 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.760000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.760000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe44a13e8 a2=28 a3=ffffe44a1528 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe44a1120 a2=50 a3=0 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.761000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit: BPF prog-id=97 op=LOAD Sep 13 00:25:35.761000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe44a1128 a2=94 a3=5 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.761000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.761000 audit: BPF prog-id=97 op=UNLOAD Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe44a1230 a2=50 a3=0 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.761000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe44a1378 a2=4 a3=3 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.761000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.761000 audit[3326]: AVC avc: denied { confidentiality } for pid=3326 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:25:35.761000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe44a1358 a2=94 a3=6 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.761000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { confidentiality } for pid=3326 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:25:35.763000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe44a0b28 a2=94 a3=83 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.763000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.763000 audit[3326]: AVC avc: denied { confidentiality } for pid=3326 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:25:35.763000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe44a0b28 a2=94 a3=83 items=0 ppid=3228 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.763000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.792000 audit: BPF prog-id=98 op=LOAD Sep 13 00:25:35.792000 audit[3349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe8a011c8 a2=98 a3=ffffe8a011b8 items=0 ppid=3228 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.792000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:25:35.794000 audit: BPF prog-id=98 op=UNLOAD Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit: BPF prog-id=99 op=LOAD Sep 13 00:25:35.794000 audit[3349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe8a01078 a2=74 a3=95 items=0 ppid=3228 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.794000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:25:35.794000 audit: BPF prog-id=99 op=UNLOAD Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:35.794000 audit: BPF prog-id=100 op=LOAD Sep 13 00:25:35.794000 audit[3349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe8a010a8 a2=40 a3=ffffe8a010d8 items=0 ppid=3228 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:35.794000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:25:35.794000 audit: BPF prog-id=100 op=UNLOAD Sep 13 00:25:35.950233 (udev-worker)[3164]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:25:35.951316 systemd-networkd[1552]: vxlan.calico: Link UP Sep 13 00:25:35.951337 systemd-networkd[1552]: vxlan.calico: Gained carrier Sep 13 00:25:36.003939 (udev-worker)[3369]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit: BPF prog-id=101 op=LOAD Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe719da98 a2=98 a3=ffffe719da88 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit: BPF prog-id=101 op=UNLOAD Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit: BPF prog-id=102 op=LOAD Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe719d778 a2=74 a3=95 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit: BPF prog-id=103 op=LOAD Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe719d7d8 a2=94 a3=2 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit: BPF prog-id=103 op=UNLOAD Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe719d808 a2=28 a3=ffffe719d938 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe719d838 a2=28 a3=ffffe719d968 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe719d6e8 a2=28 a3=ffffe719d818 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe719d858 a2=28 a3=ffffe719d988 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe719d838 a2=28 a3=ffffe719d968 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe719d828 a2=28 a3=ffffe719d958 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.011000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.011000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe719d858 a2=28 a3=ffffe719d988 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe719d838 a2=28 a3=ffffe719d968 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.012000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe719d858 a2=28 a3=ffffe719d988 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.012000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe719d828 a2=28 a3=ffffe719d958 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.012000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe719d8a8 a2=28 a3=ffffe719d9e8 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.012000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.012000 audit: BPF prog-id=104 op=LOAD Sep 13 00:25:36.012000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe719d6c8 a2=40 a3=ffffe719d6f8 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.012000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.012000 audit: BPF prog-id=104 op=UNLOAD Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe719d6f0 a2=50 a3=0 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe719d6f0 a2=50 a3=0 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit: BPF prog-id=105 op=LOAD Sep 13 00:25:36.013000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe719ce58 a2=94 a3=2 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.013000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.013000 audit: BPF prog-id=106 op=LOAD Sep 13 00:25:36.013000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe719cfe8 a2=94 a3=30 items=0 ppid=3228 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.022000 audit: BPF prog-id=107 op=LOAD Sep 13 00:25:36.022000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeeb46598 a2=98 a3=ffffeeb46588 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.022000 audit: BPF prog-id=107 op=UNLOAD Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit: BPF prog-id=108 op=LOAD Sep 13 00:25:36.023000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeeb46228 a2=74 a3=95 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.023000 audit: BPF prog-id=108 op=UNLOAD Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.023000 audit: BPF prog-id=109 op=LOAD Sep 13 00:25:36.023000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeeb46288 a2=94 a3=2 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.023000 audit: BPF prog-id=109 op=UNLOAD Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.215000 audit: BPF prog-id=110 op=LOAD Sep 13 00:25:36.215000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeeb46248 a2=40 a3=ffffeeb46278 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.215000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.216000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:25:36.216000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.216000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeeb46360 a2=50 a3=0 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.216000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.232000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.232000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeb462b8 a2=28 a3=ffffeeb463e8 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.232000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeeb462e8 a2=28 a3=ffffeeb46418 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeeb46198 a2=28 a3=ffffeeb462c8 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeb46308 a2=28 a3=ffffeeb46438 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeb462e8 a2=28 a3=ffffeeb46418 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeb462d8 a2=28 a3=ffffeeb46408 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeb46308 a2=28 a3=ffffeeb46438 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeeb462e8 a2=28 a3=ffffeeb46418 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeeb46308 a2=28 a3=ffffeeb46438 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeeb462d8 a2=28 a3=ffffeeb46408 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeeb46358 a2=28 a3=ffffeeb46498 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeeb46090 a2=50 a3=0 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.233000 audit: BPF prog-id=111 op=LOAD Sep 13 00:25:36.233000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeeb46098 a2=94 a3=5 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.234000 audit: BPF prog-id=111 op=UNLOAD Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeeb461a0 a2=50 a3=0 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeeb462e8 a2=4 a3=3 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.234000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:25:36.234000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeeb462c8 a2=94 a3=6 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:25:36.235000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeeb45a98 a2=94 a3=83 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.235000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:25:36.235000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeeb45a98 a2=94 a3=83 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.236000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.236000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeeb474d8 a2=10 a3=ffffeeb475c8 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.236000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.236000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.236000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeeb47398 a2=10 a3=ffffeeb47488 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.236000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.236000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.236000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeeb47308 a2=10 a3=ffffeeb47488 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.236000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.236000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:36.236000 audit[3382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeeb47308 a2=10 a3=ffffeeb47488 items=0 ppid=3228 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.236000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:25:36.245000 audit: BPF prog-id=106 op=UNLOAD Sep 13 00:25:36.373000 audit[3405]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=3405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:36.373000 audit[3405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff1307180 a2=0 a3=ffff9d204fa8 items=0 ppid=3228 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.373000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:36.385000 audit[3404]: NETFILTER_CFG table=raw:74 family=2 entries=21 op=nft_register_chain pid=3404 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:36.385000 audit[3404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffca33f520 a2=0 a3=ffff8538dfa8 items=0 ppid=3228 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.385000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:36.392000 audit[3407]: NETFILTER_CFG table=nat:75 family=2 entries=15 op=nft_register_chain pid=3407 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:36.392000 audit[3407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc1d2c4b0 a2=0 a3=ffff9bd9afa8 items=0 ppid=3228 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.392000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:36.395000 audit[3408]: NETFILTER_CFG table=filter:76 family=2 entries=39 op=nft_register_chain pid=3408 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:36.395000 audit[3408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffeb4c8a90 a2=0 a3=ffffafd7efa8 items=0 ppid=3228 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:36.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:36.643668 kubelet[2224]: E0913 00:25:36.643505 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:37.644645 kubelet[2224]: E0913 00:25:37.644573 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:37.665328 systemd-networkd[1552]: vxlan.calico: Gained IPv6LL Sep 13 00:25:37.879504 env[1826]: time="2025-09-13T00:25:37.878228287Z" level=info msg="StopPodSandbox for \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\"" Sep 13 00:25:37.962931 kubelet[2224]: I0913 00:25:37.962174 2224 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-f5zvt" podStartSLOduration=7.724523683 podStartE2EDuration="57.962128454s" podCreationTimestamp="2025-09-13 00:24:40 +0000 UTC" firstStartedPulling="2025-09-13 00:24:42.712949621 +0000 UTC m=+4.339827848" lastFinishedPulling="2025-09-13 00:25:32.950554392 +0000 UTC m=+54.577432619" observedRunningTime="2025-09-13 00:25:34.086218618 +0000 UTC m=+55.713096869" watchObservedRunningTime="2025-09-13 00:25:37.962128454 +0000 UTC m=+59.589006681" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:37.963 [INFO][3426] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:37.963 [INFO][3426] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" iface="eth0" netns="/var/run/netns/cni-5577de84-6025-aed8-883f-1403b831aebd" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:37.963 [INFO][3426] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" iface="eth0" netns="/var/run/netns/cni-5577de84-6025-aed8-883f-1403b831aebd" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:37.964 [INFO][3426] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" iface="eth0" netns="/var/run/netns/cni-5577de84-6025-aed8-883f-1403b831aebd" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:37.964 [INFO][3426] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:37.964 [INFO][3426] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:38.036 [INFO][3433] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:38.036 [INFO][3433] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:38.062891 env[1826]: 2025-09-13 00:25:38.036 [INFO][3433] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:38.063633 env[1826]: 2025-09-13 00:25:38.054 [WARNING][3433] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.063633 env[1826]: 2025-09-13 00:25:38.054 [INFO][3433] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.063633 env[1826]: 2025-09-13 00:25:38.057 [INFO][3433] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:38.063633 env[1826]: 2025-09-13 00:25:38.060 [INFO][3426] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:38.066947 systemd[1]: run-netns-cni\x2d5577de84\x2d6025\x2daed8\x2d883f\x2d1403b831aebd.mount: Deactivated successfully. Sep 13 00:25:38.070660 env[1826]: time="2025-09-13T00:25:38.067155591Z" level=info msg="TearDown network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\" successfully" Sep 13 00:25:38.070660 env[1826]: time="2025-09-13T00:25:38.067227749Z" level=info msg="StopPodSandbox for \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\" returns successfully" Sep 13 00:25:38.070660 env[1826]: time="2025-09-13T00:25:38.069226978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-h22fw,Uid:db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2,Namespace:default,Attempt:1,}" Sep 13 00:25:38.275517 systemd-networkd[1552]: calie0668b66a72: Link UP Sep 13 00:25:38.283374 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:25:38.283508 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie0668b66a72: link becomes ready Sep 13 00:25:38.283064 systemd-networkd[1552]: calie0668b66a72: Gained carrier Sep 13 00:25:38.300851 env[1826]: 2025-09-13 00:25:38.160 [INFO][3439] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0 nginx-deployment-8587fbcb89- default db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2 1358 0 2025-09-13 00:25:26 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.159 nginx-deployment-8587fbcb89-h22fw eth0 default [] [] [kns.default ksa.default.default] calie0668b66a72 [] [] }} ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-" Sep 13 00:25:38.300851 env[1826]: 2025-09-13 00:25:38.161 [INFO][3439] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.300851 env[1826]: 2025-09-13 00:25:38.205 [INFO][3452] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" HandleID="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.206 [INFO][3452] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" HandleID="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.159", "pod":"nginx-deployment-8587fbcb89-h22fw", "timestamp":"2025-09-13 00:25:38.205035019 +0000 UTC"}, Hostname:"172.31.31.159", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.206 [INFO][3452] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.206 [INFO][3452] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.206 [INFO][3452] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.159' Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.219 [INFO][3452] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" host="172.31.31.159" Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.227 [INFO][3452] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.159" Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.234 [INFO][3452] ipam/ipam.go 511: Trying affinity for 192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.238 [INFO][3452] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.246 [INFO][3452] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:38.301285 env[1826]: 2025-09-13 00:25:38.246 [INFO][3452] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.0/26 handle="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" host="172.31.31.159" Sep 13 00:25:38.302328 env[1826]: 2025-09-13 00:25:38.249 [INFO][3452] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee Sep 13 00:25:38.302328 env[1826]: 2025-09-13 00:25:38.256 [INFO][3452] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.0/26 handle="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" host="172.31.31.159" Sep 13 00:25:38.302328 env[1826]: 2025-09-13 00:25:38.266 [INFO][3452] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.1/26] block=192.168.69.0/26 handle="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" host="172.31.31.159" Sep 13 00:25:38.302328 env[1826]: 2025-09-13 00:25:38.266 [INFO][3452] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.1/26] handle="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" host="172.31.31.159" Sep 13 00:25:38.302328 env[1826]: 2025-09-13 00:25:38.266 [INFO][3452] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:38.302328 env[1826]: 2025-09-13 00:25:38.266 [INFO][3452] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.1/26] IPv6=[] ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" HandleID="k8s-pod-network.97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.302673 env[1826]: 2025-09-13 00:25:38.269 [INFO][3439] cni-plugin/k8s.go 418: Populated endpoint ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-h22fw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.69.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie0668b66a72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:38.302673 env[1826]: 2025-09-13 00:25:38.270 [INFO][3439] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.1/32] ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.303123 env[1826]: 2025-09-13 00:25:38.270 [INFO][3439] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie0668b66a72 ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.303123 env[1826]: 2025-09-13 00:25:38.284 [INFO][3439] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.303529 env[1826]: 2025-09-13 00:25:38.285 [INFO][3439] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee", Pod:"nginx-deployment-8587fbcb89-h22fw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.69.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie0668b66a72", MAC:"ea:f0:16:b8:fd:ad", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:38.303685 env[1826]: 2025-09-13 00:25:38.297 [INFO][3439] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee" Namespace="default" Pod="nginx-deployment-8587fbcb89-h22fw" WorkloadEndpoint="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:38.325145 env[1826]: time="2025-09-13T00:25:38.324956587Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:25:38.325483 env[1826]: time="2025-09-13T00:25:38.325427431Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:25:38.325704 env[1826]: time="2025-09-13T00:25:38.325641013Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:25:38.326312 env[1826]: time="2025-09-13T00:25:38.326232940Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee pid=3474 runtime=io.containerd.runc.v2 Sep 13 00:25:38.380390 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 13 00:25:38.380567 kernel: audit: type=1325 audit(1757723138.338:699): table=filter:77 family=2 entries=38 op=nft_register_chain pid=3476 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:38.338000 audit[3476]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=3476 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:38.372778 systemd[1]: Started cri-containerd-97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee.scope. Sep 13 00:25:38.395200 kernel: audit: type=1300 audit(1757723138.338:699): arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=fffffcba44f0 a2=0 a3=ffff8eae7fa8 items=0 ppid=3228 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:38.338000 audit[3476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=fffffcba44f0 a2=0 a3=ffff8eae7fa8 items=0 ppid=3228 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:38.338000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:38.405665 kernel: audit: type=1327 audit(1757723138.338:699): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432912 kernel: audit: type=1400 audit(1757723138.416:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433051 kernel: audit: type=1400 audit(1757723138.416:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.442142 kernel: audit: type=1400 audit(1757723138.416:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.449983 kernel: audit: type=1400 audit(1757723138.416:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.457881 kernel: audit: type=1400 audit(1757723138.416:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.465587 kernel: audit: type=1400 audit(1757723138.416:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.473371 kernel: audit: type=1400 audit(1757723138.416:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.424000 audit: BPF prog-id=112 op=LOAD Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3474 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:38.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937613130653865383764613638316331303564306362346530366333 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3474 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:38.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937613130653865383764613638316331303564306362346530366333 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit: BPF prog-id=113 op=LOAD Sep 13 00:25:38.432000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3474 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:38.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937613130653865383764613638316331303564306362346530366333 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.432000 audit: BPF prog-id=114 op=LOAD Sep 13 00:25:38.432000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3474 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:38.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937613130653865383764613638316331303564306362346530366333 Sep 13 00:25:38.433000 audit: BPF prog-id=114 op=UNLOAD Sep 13 00:25:38.433000 audit: BPF prog-id=113 op=UNLOAD Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:38.433000 audit: BPF prog-id=115 op=LOAD Sep 13 00:25:38.433000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3474 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:38.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937613130653865383764613638316331303564306362346530366333 Sep 13 00:25:38.501106 env[1826]: time="2025-09-13T00:25:38.501037180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-h22fw,Uid:db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2,Namespace:default,Attempt:1,} returns sandbox id \"97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee\"" Sep 13 00:25:38.503580 env[1826]: time="2025-09-13T00:25:38.503529309Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:25:38.645709 kubelet[2224]: E0913 00:25:38.645653 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:38.877657 env[1826]: time="2025-09-13T00:25:38.877600597Z" level=info msg="StopPodSandbox for \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\"" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.956 [INFO][3522] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.957 [INFO][3522] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" iface="eth0" netns="/var/run/netns/cni-67a5a35c-ab6d-8a6a-ac22-2a9540d7953d" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.957 [INFO][3522] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" iface="eth0" netns="/var/run/netns/cni-67a5a35c-ab6d-8a6a-ac22-2a9540d7953d" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.957 [INFO][3522] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" iface="eth0" netns="/var/run/netns/cni-67a5a35c-ab6d-8a6a-ac22-2a9540d7953d" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.957 [INFO][3522] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.958 [INFO][3522] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.993 [INFO][3529] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.993 [INFO][3529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:39.015075 env[1826]: 2025-09-13 00:25:38.993 [INFO][3529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:39.016256 env[1826]: 2025-09-13 00:25:39.007 [WARNING][3529] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.016256 env[1826]: 2025-09-13 00:25:39.007 [INFO][3529] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.016256 env[1826]: 2025-09-13 00:25:39.009 [INFO][3529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:39.016256 env[1826]: 2025-09-13 00:25:39.012 [INFO][3522] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.016498 env[1826]: time="2025-09-13T00:25:39.016240571Z" level=info msg="TearDown network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\" successfully" Sep 13 00:25:39.016498 env[1826]: time="2025-09-13T00:25:39.016292245Z" level=info msg="StopPodSandbox for \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\" returns successfully" Sep 13 00:25:39.017499 env[1826]: time="2025-09-13T00:25:39.017366572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kh44h,Uid:80a7d795-cb4a-40f8-af15-3eed22f2f4c9,Namespace:calico-system,Attempt:1,}" Sep 13 00:25:39.068487 systemd[1]: run-containerd-runc-k8s.io-97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee-runc.c5BDUd.mount: Deactivated successfully. Sep 13 00:25:39.068674 systemd[1]: run-netns-cni\x2d67a5a35c\x2dab6d\x2d8a6a\x2dac22\x2d2a9540d7953d.mount: Deactivated successfully. Sep 13 00:25:39.224302 systemd-networkd[1552]: caliaccd61a32f6: Link UP Sep 13 00:25:39.229199 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaccd61a32f6: link becomes ready Sep 13 00:25:39.229235 systemd-networkd[1552]: caliaccd61a32f6: Gained carrier Sep 13 00:25:39.257076 env[1826]: 2025-09-13 00:25:39.103 [INFO][3535] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.159-k8s-csi--node--driver--kh44h-eth0 csi-node-driver- calico-system 80a7d795-cb4a-40f8-af15-3eed22f2f4c9 1367 0 2025-09-13 00:24:39 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.31.159 csi-node-driver-kh44h eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliaccd61a32f6 [] [] }} ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-" Sep 13 00:25:39.257076 env[1826]: 2025-09-13 00:25:39.104 [INFO][3535] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.257076 env[1826]: 2025-09-13 00:25:39.158 [INFO][3549] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" HandleID="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.158 [INFO][3549] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" HandleID="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3770), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.31.159", "pod":"csi-node-driver-kh44h", "timestamp":"2025-09-13 00:25:39.158084762 +0000 UTC"}, Hostname:"172.31.31.159", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.158 [INFO][3549] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.158 [INFO][3549] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.158 [INFO][3549] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.159' Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.172 [INFO][3549] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" host="172.31.31.159" Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.179 [INFO][3549] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.159" Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.186 [INFO][3549] ipam/ipam.go 511: Trying affinity for 192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.188 [INFO][3549] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.192 [INFO][3549] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:39.257424 env[1826]: 2025-09-13 00:25:39.192 [INFO][3549] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.0/26 handle="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" host="172.31.31.159" Sep 13 00:25:39.258015 env[1826]: 2025-09-13 00:25:39.194 [INFO][3549] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe Sep 13 00:25:39.258015 env[1826]: 2025-09-13 00:25:39.201 [INFO][3549] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.0/26 handle="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" host="172.31.31.159" Sep 13 00:25:39.258015 env[1826]: 2025-09-13 00:25:39.211 [INFO][3549] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.2/26] block=192.168.69.0/26 handle="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" host="172.31.31.159" Sep 13 00:25:39.258015 env[1826]: 2025-09-13 00:25:39.211 [INFO][3549] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.2/26] handle="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" host="172.31.31.159" Sep 13 00:25:39.258015 env[1826]: 2025-09-13 00:25:39.211 [INFO][3549] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:39.258015 env[1826]: 2025-09-13 00:25:39.211 [INFO][3549] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.2/26] IPv6=[] ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" HandleID="k8s-pod-network.976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.258385 env[1826]: 2025-09-13 00:25:39.214 [INFO][3535] cni-plugin/k8s.go 418: Populated endpoint ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-csi--node--driver--kh44h-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80a7d795-cb4a-40f8-af15-3eed22f2f4c9", ResourceVersion:"1367", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 24, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"", Pod:"csi-node-driver-kh44h", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaccd61a32f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:39.258529 env[1826]: 2025-09-13 00:25:39.214 [INFO][3535] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.2/32] ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.258529 env[1826]: 2025-09-13 00:25:39.215 [INFO][3535] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaccd61a32f6 ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.258529 env[1826]: 2025-09-13 00:25:39.230 [INFO][3535] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.258707 env[1826]: 2025-09-13 00:25:39.231 [INFO][3535] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-csi--node--driver--kh44h-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80a7d795-cb4a-40f8-af15-3eed22f2f4c9", ResourceVersion:"1367", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 24, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe", Pod:"csi-node-driver-kh44h", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaccd61a32f6", MAC:"a2:0a:1e:c3:ce:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:39.258843 env[1826]: 2025-09-13 00:25:39.247 [INFO][3535] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe" Namespace="calico-system" Pod="csi-node-driver-kh44h" WorkloadEndpoint="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.278000 audit[3565]: NETFILTER_CFG table=filter:78 family=2 entries=42 op=nft_register_chain pid=3565 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:39.278000 audit[3565]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22552 a0=3 a1=ffffdbfeacd0 a2=0 a3=ffffb2289fa8 items=0 ppid=3228 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:39.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:39.284243 env[1826]: time="2025-09-13T00:25:39.284118655Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:25:39.284421 env[1826]: time="2025-09-13T00:25:39.284277647Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:25:39.284421 env[1826]: time="2025-09-13T00:25:39.284366257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:25:39.284734 env[1826]: time="2025-09-13T00:25:39.284674209Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe pid=3571 runtime=io.containerd.runc.v2 Sep 13 00:25:39.328394 systemd[1]: run-containerd-runc-k8s.io-976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe-runc.K75Kdj.mount: Deactivated successfully. Sep 13 00:25:39.334145 systemd[1]: Started cri-containerd-976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe.scope. Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit: BPF prog-id=116 op=LOAD Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3571 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:39.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366431353731613932343030313030396539623430353735636361 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3571 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:39.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366431353731613932343030313030396539623430353735636361 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.376000 audit: BPF prog-id=117 op=LOAD Sep 13 00:25:39.376000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3571 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:39.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366431353731613932343030313030396539623430353735636361 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit: BPF prog-id=118 op=LOAD Sep 13 00:25:39.377000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3571 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:39.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366431353731613932343030313030396539623430353735636361 Sep 13 00:25:39.377000 audit: BPF prog-id=118 op=UNLOAD Sep 13 00:25:39.377000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:39.377000 audit: BPF prog-id=119 op=LOAD Sep 13 00:25:39.377000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3571 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:39.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366431353731613932343030313030396539623430353735636361 Sep 13 00:25:39.403733 env[1826]: time="2025-09-13T00:25:39.403655509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kh44h,Uid:80a7d795-cb4a-40f8-af15-3eed22f2f4c9,Namespace:calico-system,Attempt:1,} returns sandbox id \"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe\"" Sep 13 00:25:39.457520 systemd-networkd[1552]: calie0668b66a72: Gained IPv6LL Sep 13 00:25:39.596901 kubelet[2224]: E0913 00:25:39.596833 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:39.642073 env[1826]: time="2025-09-13T00:25:39.641996130Z" level=info msg="StopPodSandbox for \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\"" Sep 13 00:25:39.646847 kubelet[2224]: E0913 00:25:39.646763 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:39.929907 env[1826]: 2025-09-13 00:25:39.777 [WARNING][3615] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-csi--node--driver--kh44h-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80a7d795-cb4a-40f8-af15-3eed22f2f4c9", ResourceVersion:"1370", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 24, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe", Pod:"csi-node-driver-kh44h", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaccd61a32f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:39.929907 env[1826]: 2025-09-13 00:25:39.777 [INFO][3615] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.777 [INFO][3615] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" iface="eth0" netns="" Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.777 [INFO][3615] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.777 [INFO][3615] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.889 [INFO][3622] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.905 [INFO][3622] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.905 [INFO][3622] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.919 [WARNING][3622] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.919 [INFO][3622] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.922 [INFO][3622] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:39.930258 env[1826]: 2025-09-13 00:25:39.924 [INFO][3615] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:39.931477 env[1826]: time="2025-09-13T00:25:39.931367965Z" level=info msg="TearDown network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\" successfully" Sep 13 00:25:39.931663 env[1826]: time="2025-09-13T00:25:39.931628336Z" level=info msg="StopPodSandbox for \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\" returns successfully" Sep 13 00:25:39.933250 env[1826]: time="2025-09-13T00:25:39.933176579Z" level=info msg="RemovePodSandbox for \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\"" Sep 13 00:25:39.933449 env[1826]: time="2025-09-13T00:25:39.933250573Z" level=info msg="Forcibly stopping sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\"" Sep 13 00:25:40.107915 env[1826]: 2025-09-13 00:25:40.034 [WARNING][3641] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-csi--node--driver--kh44h-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80a7d795-cb4a-40f8-af15-3eed22f2f4c9", ResourceVersion:"1370", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 24, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe", Pod:"csi-node-driver-kh44h", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaccd61a32f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:40.107915 env[1826]: 2025-09-13 00:25:40.035 [INFO][3641] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.035 [INFO][3641] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" iface="eth0" netns="" Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.035 [INFO][3641] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.035 [INFO][3641] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.080 [INFO][3648] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.080 [INFO][3648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.081 [INFO][3648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.099 [WARNING][3648] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.099 [INFO][3648] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" HandleID="k8s-pod-network.5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Workload="172.31.31.159-k8s-csi--node--driver--kh44h-eth0" Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.102 [INFO][3648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:40.108665 env[1826]: 2025-09-13 00:25:40.105 [INFO][3641] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8" Sep 13 00:25:40.109432 env[1826]: time="2025-09-13T00:25:40.109361093Z" level=info msg="TearDown network for sandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\" successfully" Sep 13 00:25:40.164496 env[1826]: time="2025-09-13T00:25:40.164437616Z" level=info msg="RemovePodSandbox \"5870689bb93238f4b8771a19142fb3de85220f7505ee764f702c9527843756b8\" returns successfully" Sep 13 00:25:40.165464 env[1826]: time="2025-09-13T00:25:40.165395120Z" level=info msg="StopPodSandbox for \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\"" Sep 13 00:25:40.309797 env[1826]: 2025-09-13 00:25:40.239 [WARNING][3663] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2", ResourceVersion:"1362", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee", Pod:"nginx-deployment-8587fbcb89-h22fw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.69.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie0668b66a72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:40.309797 env[1826]: 2025-09-13 00:25:40.240 [INFO][3663] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.309797 env[1826]: 2025-09-13 00:25:40.240 [INFO][3663] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" iface="eth0" netns="" Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.240 [INFO][3663] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.240 [INFO][3663] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.288 [INFO][3670] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.288 [INFO][3670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.288 [INFO][3670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.301 [WARNING][3670] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.301 [INFO][3670] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.304 [INFO][3670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:40.310228 env[1826]: 2025-09-13 00:25:40.306 [INFO][3663] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.310822 env[1826]: time="2025-09-13T00:25:40.310773816Z" level=info msg="TearDown network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\" successfully" Sep 13 00:25:40.310954 env[1826]: time="2025-09-13T00:25:40.310918611Z" level=info msg="StopPodSandbox for \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\" returns successfully" Sep 13 00:25:40.311797 env[1826]: time="2025-09-13T00:25:40.311752584Z" level=info msg="RemovePodSandbox for \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\"" Sep 13 00:25:40.312046 env[1826]: time="2025-09-13T00:25:40.311947589Z" level=info msg="Forcibly stopping sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\"" Sep 13 00:25:40.478866 env[1826]: 2025-09-13 00:25:40.399 [WARNING][3686] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"db46b9e1-c6ff-4c15-b3bb-5c46b14eeca2", ResourceVersion:"1362", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee", Pod:"nginx-deployment-8587fbcb89-h22fw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.69.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie0668b66a72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:40.478866 env[1826]: 2025-09-13 00:25:40.400 [INFO][3686] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.478866 env[1826]: 2025-09-13 00:25:40.400 [INFO][3686] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" iface="eth0" netns="" Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.400 [INFO][3686] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.400 [INFO][3686] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.453 [INFO][3693] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.453 [INFO][3693] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.453 [INFO][3693] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.470 [WARNING][3693] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.471 [INFO][3693] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" HandleID="k8s-pod-network.c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Workload="172.31.31.159-k8s-nginx--deployment--8587fbcb89--h22fw-eth0" Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.473 [INFO][3693] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:40.479285 env[1826]: 2025-09-13 00:25:40.476 [INFO][3686] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18" Sep 13 00:25:40.479854 env[1826]: time="2025-09-13T00:25:40.479803305Z" level=info msg="TearDown network for sandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\" successfully" Sep 13 00:25:40.483158 env[1826]: time="2025-09-13T00:25:40.483102980Z" level=info msg="RemovePodSandbox \"c8bb3b7c81744cba25ced2eab0b9c6e9962d892cde099867856ec7fc36f57b18\" returns successfully" Sep 13 00:25:40.647957 kubelet[2224]: E0913 00:25:40.647692 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:41.057951 systemd-networkd[1552]: caliaccd61a32f6: Gained IPv6LL Sep 13 00:25:41.648802 kubelet[2224]: E0913 00:25:41.648567 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:42.345270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2476231838.mount: Deactivated successfully. Sep 13 00:25:42.649203 kubelet[2224]: E0913 00:25:42.649062 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:43.649294 kubelet[2224]: E0913 00:25:43.649238 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:44.592685 env[1826]: time="2025-09-13T00:25:44.592627374Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:44.596533 env[1826]: time="2025-09-13T00:25:44.596479836Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:44.598408 env[1826]: time="2025-09-13T00:25:44.598365296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:44.601601 env[1826]: time="2025-09-13T00:25:44.601553362Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:44.603210 env[1826]: time="2025-09-13T00:25:44.603143579Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 00:25:44.607065 env[1826]: time="2025-09-13T00:25:44.607018481Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:25:44.608978 env[1826]: time="2025-09-13T00:25:44.608887357Z" level=info msg="CreateContainer within sandbox \"97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 00:25:44.630769 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3275104239.mount: Deactivated successfully. Sep 13 00:25:44.645744 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount396059128.mount: Deactivated successfully. Sep 13 00:25:44.649673 kubelet[2224]: E0913 00:25:44.649613 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:44.654145 env[1826]: time="2025-09-13T00:25:44.654065230Z" level=info msg="CreateContainer within sandbox \"97a10e8e87da681c105d0cb4e06c32c73c1570cd0fdaa998623a8cbe851515ee\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ee55886f075af33fbd00d86b972d0512eef3cc6de285db0c77aec8c99908322a\"" Sep 13 00:25:44.655021 env[1826]: time="2025-09-13T00:25:44.654921797Z" level=info msg="StartContainer for \"ee55886f075af33fbd00d86b972d0512eef3cc6de285db0c77aec8c99908322a\"" Sep 13 00:25:44.689315 systemd[1]: Started cri-containerd-ee55886f075af33fbd00d86b972d0512eef3cc6de285db0c77aec8c99908322a.scope. Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.739386 kernel: kauditd_printk_skb: 110 callbacks suppressed Sep 13 00:25:44.739487 kernel: audit: type=1400 audit(1757723144.735:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753621 kernel: audit: type=1400 audit(1757723144.735:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.761053 kernel: audit: type=1400 audit(1757723144.735:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.768623 kernel: audit: type=1400 audit(1757723144.735:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.786027 kernel: audit: type=1400 audit(1757723144.735:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.786124 kernel: audit: type=1400 audit(1757723144.735:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.794575 kernel: audit: type=1400 audit(1757723144.735:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.804335 kernel: audit: type=1400 audit(1757723144.735:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.812000 kernel: audit: type=1400 audit(1757723144.735:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.812298 kernel: audit: type=1400 audit(1757723144.738:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit: BPF prog-id=120 op=LOAD Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3474 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:44.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565353538383666303735616633336662643030643836623937326430 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3474 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:44.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565353538383666303735616633336662643030643836623937326430 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.738000 audit: BPF prog-id=121 op=LOAD Sep 13 00:25:44.738000 audit[3714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3474 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:44.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565353538383666303735616633336662643030643836623937326430 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.745000 audit: BPF prog-id=122 op=LOAD Sep 13 00:25:44.745000 audit[3714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3474 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:44.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565353538383666303735616633336662643030643836623937326430 Sep 13 00:25:44.753000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:25:44.753000 audit: BPF prog-id=121 op=UNLOAD Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { perfmon } for pid=3714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit[3714]: AVC avc: denied { bpf } for pid=3714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:44.753000 audit: BPF prog-id=123 op=LOAD Sep 13 00:25:44.753000 audit[3714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3474 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:44.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565353538383666303735616633336662643030643836623937326430 Sep 13 00:25:44.831272 env[1826]: time="2025-09-13T00:25:44.831193268Z" level=info msg="StartContainer for \"ee55886f075af33fbd00d86b972d0512eef3cc6de285db0c77aec8c99908322a\" returns successfully" Sep 13 00:25:45.650159 kubelet[2224]: E0913 00:25:45.650086 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:46.163403 env[1826]: time="2025-09-13T00:25:46.163322855Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:46.165854 env[1826]: time="2025-09-13T00:25:46.165792019Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:46.169227 env[1826]: time="2025-09-13T00:25:46.169176563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:46.171362 env[1826]: time="2025-09-13T00:25:46.171314807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:46.172328 env[1826]: time="2025-09-13T00:25:46.172228508Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 13 00:25:46.181917 env[1826]: time="2025-09-13T00:25:46.181846353Z" level=info msg="CreateContainer within sandbox \"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:25:46.205017 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3901792552.mount: Deactivated successfully. Sep 13 00:25:46.212449 env[1826]: time="2025-09-13T00:25:46.212367337Z" level=info msg="CreateContainer within sandbox \"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"80ccd342b296847cdf58eecd1e66596e8fb3e75ff878080a6d43fb08b45aa309\"" Sep 13 00:25:46.213234 env[1826]: time="2025-09-13T00:25:46.213190927Z" level=info msg="StartContainer for \"80ccd342b296847cdf58eecd1e66596e8fb3e75ff878080a6d43fb08b45aa309\"" Sep 13 00:25:46.262495 systemd[1]: Started cri-containerd-80ccd342b296847cdf58eecd1e66596e8fb3e75ff878080a6d43fb08b45aa309.scope. Sep 13 00:25:46.307000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.307000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3571 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:46.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830636364333432623239363834376364663538656563643165363635 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit: BPF prog-id=124 op=LOAD Sep 13 00:25:46.308000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3571 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:46.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830636364333432623239363834376364663538656563643165363635 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit: BPF prog-id=125 op=LOAD Sep 13 00:25:46.308000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3571 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:46.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830636364333432623239363834376364663538656563643165363635 Sep 13 00:25:46.308000 audit: BPF prog-id=125 op=UNLOAD Sep 13 00:25:46.308000 audit: BPF prog-id=124 op=UNLOAD Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:46.308000 audit: BPF prog-id=126 op=LOAD Sep 13 00:25:46.308000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3571 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:46.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830636364333432623239363834376364663538656563643165363635 Sep 13 00:25:46.342524 env[1826]: time="2025-09-13T00:25:46.342457290Z" level=info msg="StartContainer for \"80ccd342b296847cdf58eecd1e66596e8fb3e75ff878080a6d43fb08b45aa309\" returns successfully" Sep 13 00:25:46.345268 env[1826]: time="2025-09-13T00:25:46.345046217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:25:46.625194 systemd[1]: run-containerd-runc-k8s.io-80ccd342b296847cdf58eecd1e66596e8fb3e75ff878080a6d43fb08b45aa309-runc.5KmVh5.mount: Deactivated successfully. Sep 13 00:25:46.650756 kubelet[2224]: E0913 00:25:46.650694 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:47.651698 kubelet[2224]: E0913 00:25:47.651625 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:48.140429 env[1826]: time="2025-09-13T00:25:48.140374432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:48.142816 env[1826]: time="2025-09-13T00:25:48.142768172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:48.145148 env[1826]: time="2025-09-13T00:25:48.145072163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:48.147159 env[1826]: time="2025-09-13T00:25:48.147095767Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:25:48.148515 env[1826]: time="2025-09-13T00:25:48.148449217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 13 00:25:48.153211 env[1826]: time="2025-09-13T00:25:48.153150919Z" level=info msg="CreateContainer within sandbox \"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:25:48.175546 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount56891906.mount: Deactivated successfully. Sep 13 00:25:48.184200 env[1826]: time="2025-09-13T00:25:48.184089481Z" level=info msg="CreateContainer within sandbox \"976d1571a924001009e9b40575cca15aadcad790b692489ab886aa11ab5a39fe\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8fab212b2f9ec20c9fe7d043cc26ad8cf0d7136167b80601ca1a9ba2eb0d3219\"" Sep 13 00:25:48.185231 env[1826]: time="2025-09-13T00:25:48.185189833Z" level=info msg="StartContainer for \"8fab212b2f9ec20c9fe7d043cc26ad8cf0d7136167b80601ca1a9ba2eb0d3219\"" Sep 13 00:25:48.240636 systemd[1]: Started cri-containerd-8fab212b2f9ec20c9fe7d043cc26ad8cf0d7136167b80601ca1a9ba2eb0d3219.scope. Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3571 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:48.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866616232313262326639656332306339666537643034336363323661 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.279000 audit: BPF prog-id=127 op=LOAD Sep 13 00:25:48.279000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3571 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:48.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866616232313262326639656332306339666537643034336363323661 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit: BPF prog-id=128 op=LOAD Sep 13 00:25:48.280000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3571 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:48.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866616232313262326639656332306339666537643034336363323661 Sep 13 00:25:48.280000 audit: BPF prog-id=128 op=UNLOAD Sep 13 00:25:48.280000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:48.280000 audit: BPF prog-id=129 op=LOAD Sep 13 00:25:48.280000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3571 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:48.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866616232313262326639656332306339666537643034336363323661 Sep 13 00:25:48.313206 env[1826]: time="2025-09-13T00:25:48.313146438Z" level=info msg="StartContainer for \"8fab212b2f9ec20c9fe7d043cc26ad8cf0d7136167b80601ca1a9ba2eb0d3219\" returns successfully" Sep 13 00:25:48.652291 kubelet[2224]: E0913 00:25:48.652209 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:48.774694 kubelet[2224]: I0913 00:25:48.774110 2224 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:25:48.774694 kubelet[2224]: I0913 00:25:48.774153 2224 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:25:49.132030 kubelet[2224]: I0913 00:25:49.131936 2224 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-h22fw" podStartSLOduration=17.029305673 podStartE2EDuration="23.131914914s" podCreationTimestamp="2025-09-13 00:25:26 +0000 UTC" firstStartedPulling="2025-09-13 00:25:38.503112754 +0000 UTC m=+60.129990981" lastFinishedPulling="2025-09-13 00:25:44.605722007 +0000 UTC m=+66.232600222" observedRunningTime="2025-09-13 00:25:45.115858551 +0000 UTC m=+66.742736790" watchObservedRunningTime="2025-09-13 00:25:49.131914914 +0000 UTC m=+70.758793153" Sep 13 00:25:49.652570 kubelet[2224]: E0913 00:25:49.652519 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:50.654050 kubelet[2224]: E0913 00:25:50.653806 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:51.655287 kubelet[2224]: E0913 00:25:51.655226 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:52.655552 kubelet[2224]: E0913 00:25:52.655490 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:53.657023 kernel: kauditd_printk_skb: 133 callbacks suppressed Sep 13 00:25:53.657260 kernel: audit: type=1325 audit(1757723153.653:767): table=filter:79 family=2 entries=20 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.653000 audit[3843]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.657666 kubelet[2224]: E0913 00:25:53.657626 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:53.653000 audit[3843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff9ee15f0 a2=0 a3=1 items=0 ppid=2520 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:53.674500 kernel: audit: type=1300 audit(1757723153.653:767): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff9ee15f0 a2=0 a3=1 items=0 ppid=2520 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:53.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:53.680455 kernel: audit: type=1327 audit(1757723153.653:767): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:53.680583 kernel: audit: type=1325 audit(1757723153.661:768): table=nat:80 family=2 entries=26 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.661000 audit[3843]: NETFILTER_CFG table=nat:80 family=2 entries=26 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.661000 audit[3843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=fffff9ee15f0 a2=0 a3=1 items=0 ppid=2520 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:53.697853 kernel: audit: type=1300 audit(1757723153.661:768): arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=fffff9ee15f0 a2=0 a3=1 items=0 ppid=2520 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:53.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:53.705955 kernel: audit: type=1327 audit(1757723153.661:768): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:53.709000 audit[3845]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=3845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.709000 audit[3845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffde82fa30 a2=0 a3=1 items=0 ppid=2520 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:53.728109 kernel: audit: type=1325 audit(1757723153.709:769): table=filter:81 family=2 entries=32 op=nft_register_rule pid=3845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.728240 kernel: audit: type=1300 audit(1757723153.709:769): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffde82fa30 a2=0 a3=1 items=0 ppid=2520 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:53.728301 kernel: audit: type=1327 audit(1757723153.709:769): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:53.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:53.729000 audit[3845]: NETFILTER_CFG table=nat:82 family=2 entries=26 op=nft_register_rule pid=3845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.739670 kernel: audit: type=1325 audit(1757723153.729:770): table=nat:82 family=2 entries=26 op=nft_register_rule pid=3845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:25:53.729000 audit[3845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffde82fa30 a2=0 a3=1 items=0 ppid=2520 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:53.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:25:53.742629 kubelet[2224]: I0913 00:25:53.741907 2224 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kh44h" podStartSLOduration=65.99701983 podStartE2EDuration="1m14.741862323s" podCreationTimestamp="2025-09-13 00:24:39 +0000 UTC" firstStartedPulling="2025-09-13 00:25:39.40574361 +0000 UTC m=+61.032621837" lastFinishedPulling="2025-09-13 00:25:48.150586103 +0000 UTC m=+69.777464330" observedRunningTime="2025-09-13 00:25:49.132338547 +0000 UTC m=+70.759216774" watchObservedRunningTime="2025-09-13 00:25:53.741862323 +0000 UTC m=+75.368740550" Sep 13 00:25:53.752866 systemd[1]: Created slice kubepods-besteffort-podf4113073_c806_4817_a812_6fa787b0b822.slice. Sep 13 00:25:53.925375 kubelet[2224]: I0913 00:25:53.925205 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kv6km\" (UniqueName: \"kubernetes.io/projected/f4113073-c806-4817-a812-6fa787b0b822-kube-api-access-kv6km\") pod \"nfs-server-provisioner-0\" (UID: \"f4113073-c806-4817-a812-6fa787b0b822\") " pod="default/nfs-server-provisioner-0" Sep 13 00:25:53.925375 kubelet[2224]: I0913 00:25:53.925326 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f4113073-c806-4817-a812-6fa787b0b822-data\") pod \"nfs-server-provisioner-0\" (UID: \"f4113073-c806-4817-a812-6fa787b0b822\") " pod="default/nfs-server-provisioner-0" Sep 13 00:25:54.059352 env[1826]: time="2025-09-13T00:25:54.059295469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f4113073-c806-4817-a812-6fa787b0b822,Namespace:default,Attempt:0,}" Sep 13 00:25:54.282475 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:25:54.282642 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 00:25:54.278957 systemd-networkd[1552]: cali60e51b789ff: Link UP Sep 13 00:25:54.282385 systemd-networkd[1552]: cali60e51b789ff: Gained carrier Sep 13 00:25:54.286488 (udev-worker)[3867]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:25:54.310102 env[1826]: 2025-09-13 00:25:54.150 [INFO][3848] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.159-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f4113073-c806-4817-a812-6fa787b0b822 1428 0 2025-09-13 00:25:53 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.31.159 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-" Sep 13 00:25:54.310102 env[1826]: 2025-09-13 00:25:54.151 [INFO][3848] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:25:54.310102 env[1826]: 2025-09-13 00:25:54.203 [INFO][3860] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" HandleID="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Workload="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.204 [INFO][3860] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" HandleID="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Workload="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3ce0), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.159", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 00:25:54.203510937 +0000 UTC"}, Hostname:"172.31.31.159", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.204 [INFO][3860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.204 [INFO][3860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.204 [INFO][3860] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.159' Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.220 [INFO][3860] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" host="172.31.31.159" Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.228 [INFO][3860] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.159" Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.235 [INFO][3860] ipam/ipam.go 511: Trying affinity for 192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.239 [INFO][3860] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.242 [INFO][3860] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:25:54.310491 env[1826]: 2025-09-13 00:25:54.243 [INFO][3860] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.0/26 handle="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" host="172.31.31.159" Sep 13 00:25:54.311231 env[1826]: 2025-09-13 00:25:54.245 [INFO][3860] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485 Sep 13 00:25:54.311231 env[1826]: 2025-09-13 00:25:54.254 [INFO][3860] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.0/26 handle="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" host="172.31.31.159" Sep 13 00:25:54.311231 env[1826]: 2025-09-13 00:25:54.269 [INFO][3860] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.3/26] block=192.168.69.0/26 handle="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" host="172.31.31.159" Sep 13 00:25:54.311231 env[1826]: 2025-09-13 00:25:54.269 [INFO][3860] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.3/26] handle="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" host="172.31.31.159" Sep 13 00:25:54.311231 env[1826]: 2025-09-13 00:25:54.269 [INFO][3860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:25:54.311231 env[1826]: 2025-09-13 00:25:54.269 [INFO][3860] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.3/26] IPv6=[] ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" HandleID="k8s-pod-network.8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Workload="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:25:54.311578 env[1826]: 2025-09-13 00:25:54.272 [INFO][3848] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f4113073-c806-4817-a812-6fa787b0b822", ResourceVersion:"1428", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.69.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:54.311578 env[1826]: 2025-09-13 00:25:54.273 [INFO][3848] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.3/32] ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:25:54.311578 env[1826]: 2025-09-13 00:25:54.273 [INFO][3848] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:25:54.311578 env[1826]: 2025-09-13 00:25:54.284 [INFO][3848] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:25:54.311960 env[1826]: 2025-09-13 00:25:54.284 [INFO][3848] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f4113073-c806-4817-a812-6fa787b0b822", ResourceVersion:"1428", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.69.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"9a:fe:8f:84:f7:9f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:25:54.311960 env[1826]: 2025-09-13 00:25:54.304 [INFO][3848] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.159-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:25:54.344164 env[1826]: time="2025-09-13T00:25:54.344035310Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:25:54.344391 env[1826]: time="2025-09-13T00:25:54.344117487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:25:54.344391 env[1826]: time="2025-09-13T00:25:54.344145376Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:25:54.344661 env[1826]: time="2025-09-13T00:25:54.344575273Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485 pid=3885 runtime=io.containerd.runc.v2 Sep 13 00:25:54.363000 audit[3897]: NETFILTER_CFG table=filter:83 family=2 entries=40 op=nft_register_chain pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:25:54.363000 audit[3897]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffc59e6da0 a2=0 a3=ffff81fbcfa8 items=0 ppid=3228 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:54.363000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:25:54.376197 systemd[1]: Started cri-containerd-8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485.scope. Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.428000 audit: BPF prog-id=130 op=LOAD Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:54.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863646535636336356666373135396432663362303738636537316261 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:54.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863646535636336356666373135396432663362303738636537316261 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.429000 audit: BPF prog-id=131 op=LOAD Sep 13 00:25:54.429000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:54.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863646535636336356666373135396432663362303738636537316261 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit: BPF prog-id=132 op=LOAD Sep 13 00:25:54.430000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:54.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863646535636336356666373135396432663362303738636537316261 Sep 13 00:25:54.430000 audit: BPF prog-id=132 op=UNLOAD Sep 13 00:25:54.430000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:25:54.430000 audit: BPF prog-id=133 op=LOAD Sep 13 00:25:54.430000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:25:54.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863646535636336356666373135396432663362303738636537316261 Sep 13 00:25:54.473071 env[1826]: time="2025-09-13T00:25:54.472923682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f4113073-c806-4817-a812-6fa787b0b822,Namespace:default,Attempt:0,} returns sandbox id \"8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485\"" Sep 13 00:25:54.476530 env[1826]: time="2025-09-13T00:25:54.476475862Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 00:25:54.658423 kubelet[2224]: E0913 00:25:54.658364 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:55.045888 systemd[1]: run-containerd-runc-k8s.io-8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485-runc.2HBdSv.mount: Deactivated successfully. Sep 13 00:25:55.658812 kubelet[2224]: E0913 00:25:55.658735 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:56.097842 systemd-networkd[1552]: cali60e51b789ff: Gained IPv6LL Sep 13 00:25:56.659276 kubelet[2224]: E0913 00:25:56.659209 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:57.660206 kubelet[2224]: E0913 00:25:57.660117 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:57.857516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount146570599.mount: Deactivated successfully. Sep 13 00:25:58.660850 kubelet[2224]: E0913 00:25:58.660806 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:59.597071 kubelet[2224]: E0913 00:25:59.597014 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:25:59.662309 kubelet[2224]: E0913 00:25:59.662228 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:00.662826 kubelet[2224]: E0913 00:26:00.662759 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:01.173755 systemd[1]: run-containerd-runc-k8s.io-10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0-runc.T7Zjib.mount: Deactivated successfully. Sep 13 00:26:01.412738 env[1826]: time="2025-09-13T00:26:01.412670072Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:01.415661 env[1826]: time="2025-09-13T00:26:01.415579869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:01.426021 env[1826]: time="2025-09-13T00:26:01.425852867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:01.431437 env[1826]: time="2025-09-13T00:26:01.431376245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:01.433327 env[1826]: time="2025-09-13T00:26:01.433253303Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 13 00:26:01.438542 env[1826]: time="2025-09-13T00:26:01.438486682Z" level=info msg="CreateContainer within sandbox \"8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 00:26:01.460385 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2545432041.mount: Deactivated successfully. Sep 13 00:26:01.471335 env[1826]: time="2025-09-13T00:26:01.471233528Z" level=info msg="CreateContainer within sandbox \"8cde5cc65ff7159d2f3b078ce71ba50f14f6dbeec08d1399d4c58cb8e3cc2485\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"ae12c37e257db435aaeba44089d43d128e1fcb2277f488ade69459a7f690492f\"" Sep 13 00:26:01.472847 env[1826]: time="2025-09-13T00:26:01.472773391Z" level=info msg="StartContainer for \"ae12c37e257db435aaeba44089d43d128e1fcb2277f488ade69459a7f690492f\"" Sep 13 00:26:01.504788 systemd[1]: Started cri-containerd-ae12c37e257db435aaeba44089d43d128e1fcb2277f488ade69459a7f690492f.scope. Sep 13 00:26:01.549402 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 13 00:26:01.549532 kernel: audit: type=1400 audit(1757723161.546:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.564296 kernel: audit: type=1400 audit(1757723161.546:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.564385 kernel: audit: type=1400 audit(1757723161.546:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.581221 kernel: audit: type=1400 audit(1757723161.546:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.581315 kernel: audit: type=1400 audit(1757723161.546:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.596123 kernel: audit: type=1400 audit(1757723161.546:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.596194 kernel: audit: type=1400 audit(1757723161.546:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.611221 kernel: audit: type=1400 audit(1757723161.546:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.619249 kernel: audit: type=1400 audit(1757723161.546:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.627017 kernel: audit: type=1400 audit(1757723161.548:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.548000 audit: BPF prog-id=134 op=LOAD Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3885 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:01.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313263333765323537646234333561616562613434303839643433 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3885 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:01.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313263333765323537646234333561616562613434303839643433 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.549000 audit: BPF prog-id=135 op=LOAD Sep 13 00:26:01.549000 audit[3958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3885 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:01.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313263333765323537646234333561616562613434303839643433 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.556000 audit: BPF prog-id=136 op=LOAD Sep 13 00:26:01.556000 audit[3958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3885 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:01.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313263333765323537646234333561616562613434303839643433 Sep 13 00:26:01.563000 audit: BPF prog-id=136 op=UNLOAD Sep 13 00:26:01.563000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:01.563000 audit: BPF prog-id=137 op=LOAD Sep 13 00:26:01.563000 audit[3958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3885 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:01.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165313263333765323537646234333561616562613434303839643433 Sep 13 00:26:01.648886 env[1826]: time="2025-09-13T00:26:01.648796406Z" level=info msg="StartContainer for \"ae12c37e257db435aaeba44089d43d128e1fcb2277f488ade69459a7f690492f\" returns successfully" Sep 13 00:26:01.663755 kubelet[2224]: E0913 00:26:01.663677 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:01.773000 audit[3988]: AVC avc: denied { search } for pid=3988 comm="rpcbind" name="crypto" dev="proc" ino=19147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:26:01.773000 audit[3988]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8d03f000 a2=0 a3=0 items=0 ppid=3969 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 key=(null) Sep 13 00:26:01.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 00:26:01.857000 audit[3993]: AVC avc: denied { search } for pid=3993 comm="dbus-daemon" name="crypto" dev="proc" ino=19147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:26:01.857000 audit[3993]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8edef000 a2=0 a3=0 items=0 ppid=3969 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 key=(null) Sep 13 00:26:01.857000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:26:01.864000 audit[3994]: AVC avc: denied { watch } for pid=3994 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c842,c997 tclass=dir permissive=0 Sep 13 00:26:01.864000 audit[3994]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae09f0090 a2=2c8 a3=aaaae09caa60 items=0 ppid=3969 pid=3994 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 key=(null) Sep 13 00:26:01.864000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:26:01.873000 audit[3995]: AVC avc: denied { read } for pid=3995 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20014 scontext=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 00:26:01.873000 audit[3995]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb5f5a570 a2=80000 a3=0 items=0 ppid=3969 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 key=(null) Sep 13 00:26:01.873000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:26:01.875000 audit[3995]: AVC avc: denied { search } for pid=3995 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:26:01.875000 audit[3995]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb52ef000 a2=0 a3=0 items=0 ppid=3969 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c842,c997 key=(null) Sep 13 00:26:01.875000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:26:02.185000 audit[4000]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:26:02.185000 audit[4000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc226bee0 a2=0 a3=1 items=0 ppid=2520 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:02.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:26:02.193000 audit[4000]: NETFILTER_CFG table=nat:85 family=2 entries=110 op=nft_register_chain pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:26:02.193000 audit[4000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffc226bee0 a2=0 a3=1 items=0 ppid=2520 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:02.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:26:02.664316 kubelet[2224]: E0913 00:26:02.664249 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:03.665324 kubelet[2224]: E0913 00:26:03.665262 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:04.666121 kubelet[2224]: E0913 00:26:04.666056 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:05.667097 kubelet[2224]: E0913 00:26:05.667054 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:06.668057 kubelet[2224]: E0913 00:26:06.668002 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:07.668799 kubelet[2224]: E0913 00:26:07.668755 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:08.670139 kubelet[2224]: E0913 00:26:08.670063 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:09.671222 kubelet[2224]: E0913 00:26:09.671154 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:10.671676 kubelet[2224]: E0913 00:26:10.671613 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:11.672028 kubelet[2224]: E0913 00:26:11.671845 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:12.672687 kubelet[2224]: E0913 00:26:12.672593 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:13.673161 kubelet[2224]: E0913 00:26:13.673098 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:14.673889 kubelet[2224]: E0913 00:26:14.673818 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:15.674258 kubelet[2224]: E0913 00:26:15.674190 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:16.675189 kubelet[2224]: E0913 00:26:16.675146 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:17.675907 kubelet[2224]: E0913 00:26:17.675841 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:18.677031 kubelet[2224]: E0913 00:26:18.676956 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:19.597548 kubelet[2224]: E0913 00:26:19.597482 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:19.677536 kubelet[2224]: E0913 00:26:19.677474 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:20.678296 kubelet[2224]: E0913 00:26:20.678254 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:21.679610 kubelet[2224]: E0913 00:26:21.679571 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:22.680877 kubelet[2224]: E0913 00:26:22.680809 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:23.681444 kubelet[2224]: E0913 00:26:23.681384 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:24.682585 kubelet[2224]: E0913 00:26:24.682503 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:25.683631 kubelet[2224]: E0913 00:26:25.683585 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:26.128207 kubelet[2224]: I0913 00:26:26.128098 2224 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=26.167775537 podStartE2EDuration="33.128038739s" podCreationTimestamp="2025-09-13 00:25:53 +0000 UTC" firstStartedPulling="2025-09-13 00:25:54.475554051 +0000 UTC m=+76.102432290" lastFinishedPulling="2025-09-13 00:26:01.435817265 +0000 UTC m=+83.062695492" observedRunningTime="2025-09-13 00:26:02.167478673 +0000 UTC m=+83.794356900" watchObservedRunningTime="2025-09-13 00:26:26.128038739 +0000 UTC m=+107.754916966" Sep 13 00:26:26.138515 systemd[1]: Created slice kubepods-besteffort-pod9e17c0f6_b908_42a9_a8f1_05193dbe6344.slice. Sep 13 00:26:26.301504 kubelet[2224]: I0913 00:26:26.301191 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-46e2d07b-9e0f-4cac-bf9a-3b015e8eafdf\" (UniqueName: \"kubernetes.io/nfs/9e17c0f6-b908-42a9-a8f1-05193dbe6344-pvc-46e2d07b-9e0f-4cac-bf9a-3b015e8eafdf\") pod \"test-pod-1\" (UID: \"9e17c0f6-b908-42a9-a8f1-05193dbe6344\") " pod="default/test-pod-1" Sep 13 00:26:26.301703 kubelet[2224]: I0913 00:26:26.301543 2224 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whp77\" (UniqueName: \"kubernetes.io/projected/9e17c0f6-b908-42a9-a8f1-05193dbe6344-kube-api-access-whp77\") pod \"test-pod-1\" (UID: \"9e17c0f6-b908-42a9-a8f1-05193dbe6344\") " pod="default/test-pod-1" Sep 13 00:26:26.503825 kernel: Failed to create system directory netfs Sep 13 00:26:26.504025 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 00:26:26.504081 kernel: audit: type=1400 audit(1757723186.487:815): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.504139 kernel: Failed to create system directory netfs Sep 13 00:26:26.504185 kernel: audit: type=1400 audit(1757723186.487:815): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.504226 kernel: Failed to create system directory netfs Sep 13 00:26:26.487000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.487000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.487000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.513884 kernel: audit: type=1400 audit(1757723186.487:815): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.513976 kernel: Failed to create system directory netfs Sep 13 00:26:26.487000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.523096 kernel: audit: type=1400 audit(1757723186.487:815): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.487000 audit[4031]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad7d5d5e0 a1=12c14 a2=aaaab6f0e028 a3=aaaad7d4e010 items=0 ppid=51 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:26.543557 kernel: audit: type=1300 audit(1757723186.487:815): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad7d5d5e0 a1=12c14 a2=aaaab6f0e028 a3=aaaad7d4e010 items=0 ppid=51 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:26.543680 kernel: audit: type=1327 audit(1757723186.487:815): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:26:26.487000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.579289 kernel: Failed to create system directory fscache Sep 13 00:26:26.579371 kernel: audit: type=1400 audit(1757723186.563:816): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.579436 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.589266 kernel: audit: type=1400 audit(1757723186.563:816): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.589371 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.599267 kernel: audit: type=1400 audit(1757723186.563:816): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.599336 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.609270 kernel: audit: type=1400 audit(1757723186.563:816): avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.609347 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.612988 kernel: Failed to create system directory fscache Sep 13 00:26:26.613092 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.616786 kernel: Failed to create system directory fscache Sep 13 00:26:26.616862 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.620591 kernel: Failed to create system directory fscache Sep 13 00:26:26.620664 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.624354 kernel: Failed to create system directory fscache Sep 13 00:26:26.624413 kernel: Failed to create system directory fscache Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.563000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.628054 kernel: Failed to create system directory fscache Sep 13 00:26:26.629671 kernel: FS-Cache: Loaded Sep 13 00:26:26.563000 audit[4031]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad7f70210 a1=4c344 a2=aaaab6f0e028 a3=aaaad7d4e010 items=0 ppid=51 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:26.563000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:26:26.685173 kubelet[2224]: E0913 00:26:26.685098 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.706555 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.706638 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.706679 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.710320 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.710421 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.714039 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.714124 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.717746 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.717807 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.721453 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.721526 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.725132 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.725211 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.728806 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.728880 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.732547 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.732633 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.736271 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.736355 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.739949 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.740051 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.743702 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.743790 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.747552 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.747625 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.751270 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.751321 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.754892 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.754952 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.758676 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.758795 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.762416 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.762494 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.764280 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.767875 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.767976 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.771625 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.771687 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.775300 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.775372 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.779105 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.781147 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.781211 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.784845 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.784928 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.788529 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.788625 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.790416 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.794060 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.794137 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.797750 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.801895 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.802017 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.802062 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.806061 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.806140 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.809635 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.809713 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.812357 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.815118 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.815215 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.818771 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.820714 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.820920 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.824550 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.824622 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.826367 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.828204 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.830023 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.833656 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.833718 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.837285 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.837347 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.839136 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.840891 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.842761 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.844589 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.846436 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.848260 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.850039 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.851849 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.853666 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.855500 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.859134 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.859200 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.860907 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.864626 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.864700 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.866523 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.868432 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.870142 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.872026 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.873791 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.875696 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.879357 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.879410 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.881072 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.882956 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.886697 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.888911 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.889019 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.892518 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.892617 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.896296 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.896387 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.898047 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.899913 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.901692 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.903613 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.905363 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.907233 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.908941 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.910867 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.912642 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.914559 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.916308 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.918204 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.919907 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.921850 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.923622 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.925553 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.927285 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.929148 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.930884 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.932800 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.934573 kernel: Failed to create system directory sunrpc Sep 13 00:26:26.691000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.948249 kernel: RPC: Registered named UNIX socket transport module. Sep 13 00:26:26.948388 kernel: RPC: Registered udp transport module. Sep 13 00:26:26.948456 kernel: RPC: Registered tcp transport module. Sep 13 00:26:26.949871 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 00:26:26.691000 audit[4031]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad7fbc560 a1=14a804 a2=aaaab6f0e028 a3=aaaad7d4e010 items=6 ppid=51 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:26.691000 audit: CWD cwd="/" Sep 13 00:26:26.691000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:26:26.691000 audit: PATH item=1 name=(null) inode=19304 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:26:26.691000 audit: PATH item=2 name=(null) inode=19304 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:26:26.691000 audit: PATH item=3 name=(null) inode=19305 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:26:26.691000 audit: PATH item=4 name=(null) inode=19304 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:26:26.691000 audit: PATH item=5 name=(null) inode=19306 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:26:26.691000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.004117 kernel: Failed to create system directory nfs Sep 13 00:26:27.004210 kernel: Failed to create system directory nfs Sep 13 00:26:27.004256 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.007593 kernel: Failed to create system directory nfs Sep 13 00:26:27.007687 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.016617 kernel: Failed to create system directory nfs Sep 13 00:26:27.016768 kernel: Failed to create system directory nfs Sep 13 00:26:27.016834 kernel: Failed to create system directory nfs Sep 13 00:26:27.016881 kernel: Failed to create system directory nfs Sep 13 00:26:27.016928 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.018586 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.020144 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.021925 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.023593 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.025416 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.028943 kernel: Failed to create system directory nfs Sep 13 00:26:27.029040 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.032494 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.034534 kernel: Failed to create system directory nfs Sep 13 00:26:27.034641 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.038410 kernel: Failed to create system directory nfs Sep 13 00:26:27.038596 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.041827 kernel: Failed to create system directory nfs Sep 13 00:26:27.041879 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.045263 kernel: Failed to create system directory nfs Sep 13 00:26:27.045359 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.048810 kernel: Failed to create system directory nfs Sep 13 00:26:27.048909 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.052321 kernel: Failed to create system directory nfs Sep 13 00:26:27.052414 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.055934 kernel: Failed to create system directory nfs Sep 13 00:26:27.056019 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.057744 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.061280 kernel: Failed to create system directory nfs Sep 13 00:26:27.061369 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.064748 kernel: Failed to create system directory nfs Sep 13 00:26:27.064848 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.068481 kernel: Failed to create system directory nfs Sep 13 00:26:27.068578 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.071826 kernel: Failed to create system directory nfs Sep 13 00:26:27.071915 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.075384 kernel: Failed to create system directory nfs Sep 13 00:26:27.075473 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.078859 kernel: Failed to create system directory nfs Sep 13 00:26:27.078938 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.082304 kernel: Failed to create system directory nfs Sep 13 00:26:27.082382 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.085855 kernel: Failed to create system directory nfs Sep 13 00:26:27.085908 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.089366 kernel: Failed to create system directory nfs Sep 13 00:26:27.089445 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.092803 kernel: Failed to create system directory nfs Sep 13 00:26:27.092880 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.096446 kernel: Failed to create system directory nfs Sep 13 00:26:27.096496 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.100032 kernel: Failed to create system directory nfs Sep 13 00:26:27.100109 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.103613 kernel: Failed to create system directory nfs Sep 13 00:26:27.103692 kernel: Failed to create system directory nfs Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:26.992000 audit[4031]: AVC avc: denied { confidentiality } for pid=4031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.107164 kernel: Failed to create system directory nfs Sep 13 00:26:27.138152 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 00:26:26.992000 audit[4031]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad8165b50 a1=116324 a2=aaaab6f0e028 a3=aaaad7d4e010 items=0 ppid=51 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:26.992000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.190285 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.194037 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.194130 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.196077 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.198065 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.200029 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.202035 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.203892 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.208240 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.208369 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.210764 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.213349 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.215256 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.217107 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.219045 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.221201 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.223095 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.224959 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.226841 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.226997 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.230497 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.232438 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.232506 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.236098 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.236159 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.241598 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.241648 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.241688 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.245280 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.245342 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.248912 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.248987 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.252629 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.252679 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.256280 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.256330 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.259888 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.259938 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.263624 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.263675 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.267315 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.267417 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.275492 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.275579 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.278484 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.278540 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.280272 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.283875 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.283957 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.287499 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.287589 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.291117 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.293145 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.295230 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.295332 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.299101 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.299197 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.300873 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.304602 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.304679 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.308141 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.308217 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.311794 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.311914 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.313803 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.315608 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.317459 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.319315 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.321063 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.324760 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.324811 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.328398 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.328506 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.330296 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.333865 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.333941 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.337478 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.337528 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.341055 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.341105 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.344701 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.344753 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.348323 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.348418 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.351863 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.351941 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.355478 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.355554 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.359087 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.359139 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.362693 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.362779 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.366219 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.366269 kernel: Failed to create system directory nfs4 Sep 13 00:26:27.174000 audit[4038]: AVC avc: denied { confidentiality } for pid=4038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.547320 kernel: NFS: Registering the id_resolver key type Sep 13 00:26:27.547477 kernel: Key type id_resolver registered Sep 13 00:26:27.547521 kernel: Key type id_legacy registered Sep 13 00:26:27.174000 audit[4038]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff901da010 a1=19c744 a2=aaaabadfe028 a3=aaaaec6e9010 items=0 ppid=51 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:27.174000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.572641 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.572861 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.572959 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.576676 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.576727 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.580333 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.580386 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.582082 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.583933 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.587645 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.587698 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.589392 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.591307 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.593066 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.596714 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.596763 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.598469 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.600382 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.604077 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.604155 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.607812 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.607916 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.611635 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.611712 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.615377 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.615574 kernel: Failed to create system directory rpcgss Sep 13 00:26:27.564000 audit[4039]: AVC avc: denied { confidentiality } for pid=4039 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:26:27.564000 audit[4039]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa4cc2010 a1=5eedc a2=aaaae23de028 a3=aaab06404010 items=0 ppid=51 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:27.564000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 00:26:27.686197 kubelet[2224]: E0913 00:26:27.686091 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:27.749459 nfsidmap[4048]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 13 00:26:27.754881 nfsidmap[4049]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Sep 13 00:26:27.772000 audit[2030]: AVC avc: denied { watch_reads } for pid=2030 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:26:27.772000 audit[2030]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae27a7220 a2=10 a3=0 items=0 ppid=1 pid=2030 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:27.772000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:26:27.773000 audit[2030]: AVC avc: denied { watch_reads } for pid=2030 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:26:27.773000 audit[2030]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae27a7220 a2=10 a3=0 items=0 ppid=1 pid=2030 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:27.773000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:26:27.773000 audit[2030]: AVC avc: denied { watch_reads } for pid=2030 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:26:27.773000 audit[2030]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae27a7220 a2=10 a3=0 items=0 ppid=1 pid=2030 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:27.773000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:26:27.774000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:26:27.774000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:26:27.774000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:26:27.948658 env[1826]: time="2025-09-13T00:26:27.944921201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9e17c0f6-b908-42a9-a8f1-05193dbe6344,Namespace:default,Attempt:0,}" Sep 13 00:26:28.164706 (udev-worker)[4041]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:26:28.166538 systemd-networkd[1552]: cali5ec59c6bf6e: Link UP Sep 13 00:26:28.174632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:26:28.174771 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 00:26:28.174300 systemd-networkd[1552]: cali5ec59c6bf6e: Gained carrier Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.041 [INFO][4053] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.159-k8s-test--pod--1-eth0 default 9e17c0f6-b908-42a9-a8f1-05193dbe6344 1529 0 2025-09-13 00:25:54 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.159 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.043 [INFO][4053] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-eth0" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.089 [INFO][4066] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" HandleID="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Workload="172.31.31.159-k8s-test--pod--1-eth0" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.089 [INFO][4066] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" HandleID="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Workload="172.31.31.159-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c1710), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.159", "pod":"test-pod-1", "timestamp":"2025-09-13 00:26:28.088993181 +0000 UTC"}, Hostname:"172.31.31.159", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.089 [INFO][4066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.089 [INFO][4066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.089 [INFO][4066] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.159' Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.106 [INFO][4066] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.113 [INFO][4066] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.120 [INFO][4066] ipam/ipam.go 511: Trying affinity for 192.168.69.0/26 host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.126 [INFO][4066] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.131 [INFO][4066] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.0/26 host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.131 [INFO][4066] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.0/26 handle="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.134 [INFO][4066] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.141 [INFO][4066] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.0/26 handle="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.153 [INFO][4066] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.4/26] block=192.168.69.0/26 handle="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.153 [INFO][4066] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.4/26] handle="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" host="172.31.31.159" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.153 [INFO][4066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.154 [INFO][4066] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.4/26] IPv6=[] ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" HandleID="k8s-pod-network.b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Workload="172.31.31.159-k8s-test--pod--1-eth0" Sep 13 00:26:28.208280 env[1826]: 2025-09-13 00:26:28.156 [INFO][4053] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9e17c0f6-b908-42a9-a8f1-05193dbe6344", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.69.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:26:28.209901 env[1826]: 2025-09-13 00:26:28.156 [INFO][4053] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.4/32] ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-eth0" Sep 13 00:26:28.209901 env[1826]: 2025-09-13 00:26:28.156 [INFO][4053] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-eth0" Sep 13 00:26:28.209901 env[1826]: 2025-09-13 00:26:28.178 [INFO][4053] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-eth0" Sep 13 00:26:28.209901 env[1826]: 2025-09-13 00:26:28.186 [INFO][4053] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.159-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9e17c0f6-b908-42a9-a8f1-05193dbe6344", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.159", ContainerID:"b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.69.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"3a:ea:a6:5e:be:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:26:28.209901 env[1826]: 2025-09-13 00:26:28.205 [INFO][4053] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.159-k8s-test--pod--1-eth0" Sep 13 00:26:28.230905 env[1826]: time="2025-09-13T00:26:28.230764699Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:26:28.230905 env[1826]: time="2025-09-13T00:26:28.230843683Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:26:28.231268 env[1826]: time="2025-09-13T00:26:28.230870959Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:26:28.231764 env[1826]: time="2025-09-13T00:26:28.231627199Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c pid=4086 runtime=io.containerd.runc.v2 Sep 13 00:26:28.269263 systemd[1]: Started cri-containerd-b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c.scope. Sep 13 00:26:28.279000 audit[4106]: NETFILTER_CFG table=filter:86 family=2 entries=40 op=nft_register_chain pid=4106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:26:28.279000 audit[4106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffff92f84d0 a2=0 a3=ffffbd800fa8 items=0 ppid=3228 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit: BPF prog-id=138 op=LOAD Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4086 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303237616135343932343239333736303230393365633534633538 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4086 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303237616135343932343239333736303230393365633534633538 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.315000 audit: BPF prog-id=139 op=LOAD Sep 13 00:26:28.315000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4086 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303237616135343932343239333736303230393365633534633538 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit: BPF prog-id=140 op=LOAD Sep 13 00:26:28.316000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4086 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303237616135343932343239333736303230393365633534633538 Sep 13 00:26:28.316000 audit: BPF prog-id=140 op=UNLOAD Sep 13 00:26:28.316000 audit: BPF prog-id=139 op=UNLOAD Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.316000 audit: BPF prog-id=141 op=LOAD Sep 13 00:26:28.316000 audit[4097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4086 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303237616135343932343239333736303230393365633534633538 Sep 13 00:26:28.362259 env[1826]: time="2025-09-13T00:26:28.362177327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9e17c0f6-b908-42a9-a8f1-05193dbe6344,Namespace:default,Attempt:0,} returns sandbox id \"b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c\"" Sep 13 00:26:28.365455 env[1826]: time="2025-09-13T00:26:28.365379974Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:26:28.686695 kubelet[2224]: E0913 00:26:28.686625 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:28.776205 env[1826]: time="2025-09-13T00:26:28.776123789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:28.781594 env[1826]: time="2025-09-13T00:26:28.781531870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:28.785561 env[1826]: time="2025-09-13T00:26:28.785512297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:28.789398 env[1826]: time="2025-09-13T00:26:28.789348533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:26:28.790831 env[1826]: time="2025-09-13T00:26:28.790783734Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 00:26:28.796025 env[1826]: time="2025-09-13T00:26:28.795929950Z" level=info msg="CreateContainer within sandbox \"b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 00:26:28.824416 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3567839759.mount: Deactivated successfully. Sep 13 00:26:28.839693 env[1826]: time="2025-09-13T00:26:28.839631756Z" level=info msg="CreateContainer within sandbox \"b5027aa549242937602093ec54c58dbcc64d5aa6f0a8de76268783f3cbd8dd8c\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c4127c7da92d896f4e7dfa321b4fdf6f7a41ad1819270eb469a655ae85fbf42e\"" Sep 13 00:26:28.841165 env[1826]: time="2025-09-13T00:26:28.841066801Z" level=info msg="StartContainer for \"c4127c7da92d896f4e7dfa321b4fdf6f7a41ad1819270eb469a655ae85fbf42e\"" Sep 13 00:26:28.875069 systemd[1]: Started cri-containerd-c4127c7da92d896f4e7dfa321b4fdf6f7a41ad1819270eb469a655ae85fbf42e.scope. Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.912000 audit: BPF prog-id=142 op=LOAD Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4086 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313237633764613932643839366634653764666133323162346664 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4086 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313237633764613932643839366634653764666133323162346664 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.914000 audit: BPF prog-id=143 op=LOAD Sep 13 00:26:28.914000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4086 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313237633764613932643839366634653764666133323162346664 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit: BPF prog-id=144 op=LOAD Sep 13 00:26:28.915000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4086 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313237633764613932643839366634653764666133323162346664 Sep 13 00:26:28.915000 audit: BPF prog-id=144 op=UNLOAD Sep 13 00:26:28.915000 audit: BPF prog-id=143 op=UNLOAD Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:26:28.915000 audit: BPF prog-id=145 op=LOAD Sep 13 00:26:28.915000 audit[4130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4086 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:26:28.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313237633764613932643839366634653764666133323162346664 Sep 13 00:26:28.946395 env[1826]: time="2025-09-13T00:26:28.946255087Z" level=info msg="StartContainer for \"c4127c7da92d896f4e7dfa321b4fdf6f7a41ad1819270eb469a655ae85fbf42e\" returns successfully" Sep 13 00:26:29.377289 systemd-networkd[1552]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 00:26:29.687076 kubelet[2224]: E0913 00:26:29.686927 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:30.688689 kubelet[2224]: E0913 00:26:30.688624 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:31.153204 systemd[1]: run-containerd-runc-k8s.io-10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0-runc.FPLaOB.mount: Deactivated successfully. Sep 13 00:26:31.689194 kubelet[2224]: E0913 00:26:31.689127 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:32.690230 kubelet[2224]: E0913 00:26:32.690160 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:33.690793 kubelet[2224]: E0913 00:26:33.690731 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:34.691636 kubelet[2224]: E0913 00:26:34.691565 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:35.692100 kubelet[2224]: E0913 00:26:35.692030 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:36.693187 kubelet[2224]: E0913 00:26:36.693144 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:37.695028 kubelet[2224]: E0913 00:26:37.694942 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:38.695542 kubelet[2224]: E0913 00:26:38.695497 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:39.597091 kubelet[2224]: E0913 00:26:39.597050 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:39.697292 kubelet[2224]: E0913 00:26:39.697251 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:40.698707 kubelet[2224]: E0913 00:26:40.698644 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:41.699206 kubelet[2224]: E0913 00:26:41.699143 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:42.699562 kubelet[2224]: E0913 00:26:42.699492 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:43.700034 kubelet[2224]: E0913 00:26:43.699989 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:44.701404 kubelet[2224]: E0913 00:26:44.701360 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:45.702582 kubelet[2224]: E0913 00:26:45.702528 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:46.704352 kubelet[2224]: E0913 00:26:46.704283 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:47.705006 kubelet[2224]: E0913 00:26:47.704937 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:48.706006 kubelet[2224]: E0913 00:26:48.705931 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:49.707391 kubelet[2224]: E0913 00:26:49.707353 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:50.708709 kubelet[2224]: E0913 00:26:50.708642 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:51.708825 kubelet[2224]: E0913 00:26:51.708755 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:52.709122 kubelet[2224]: E0913 00:26:52.709082 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:53.217460 kubelet[2224]: E0913 00:26:53.217384 2224 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 00:26:53.710076 kubelet[2224]: E0913 00:26:53.710010 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:54.710732 kubelet[2224]: E0913 00:26:54.710661 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:55.711618 kubelet[2224]: E0913 00:26:55.711547 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:56.712677 kubelet[2224]: E0913 00:26:56.712632 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:57.714070 kubelet[2224]: E0913 00:26:57.713999 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:58.714587 kubelet[2224]: E0913 00:26:58.714545 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:59.597031 kubelet[2224]: E0913 00:26:59.596956 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:26:59.715372 kubelet[2224]: E0913 00:26:59.715316 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:00.716410 kubelet[2224]: E0913 00:27:00.716365 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:01.154430 systemd[1]: run-containerd-runc-k8s.io-10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0-runc.IJbXsD.mount: Deactivated successfully. Sep 13 00:27:01.717390 kubelet[2224]: E0913 00:27:01.717321 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:02.717836 kubelet[2224]: E0913 00:27:02.717768 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:03.218329 kubelet[2224]: E0913 00:27:03.218248 2224 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 00:27:03.718794 kubelet[2224]: E0913 00:27:03.718751 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:04.719674 kubelet[2224]: E0913 00:27:04.719606 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:05.719795 kubelet[2224]: E0913 00:27:05.719752 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:06.721472 kubelet[2224]: E0913 00:27:06.721429 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:07.722318 kubelet[2224]: E0913 00:27:07.722246 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:08.723441 kubelet[2224]: E0913 00:27:08.723398 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:09.724884 kubelet[2224]: E0913 00:27:09.724843 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:10.726059 kubelet[2224]: E0913 00:27:10.725995 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:11.726787 kubelet[2224]: E0913 00:27:11.726723 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:12.727332 kubelet[2224]: E0913 00:27:12.727278 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:13.219406 kubelet[2224]: E0913 00:27:13.219177 2224 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 00:27:13.728310 kubelet[2224]: E0913 00:27:13.728265 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:14.729903 kubelet[2224]: E0913 00:27:14.729855 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:15.730707 kubelet[2224]: E0913 00:27:15.730662 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:16.173593 kubelet[2224]: E0913 00:27:16.173526 2224 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": unexpected EOF" Sep 13 00:27:16.175748 kubelet[2224]: E0913 00:27:16.175695 2224 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": dial tcp 172.31.25.123:6443: connect: connection refused" Sep 13 00:27:16.176062 kubelet[2224]: I0913 00:27:16.176013 2224 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Sep 13 00:27:16.176819 kubelet[2224]: E0913 00:27:16.176774 2224 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": dial tcp 172.31.25.123:6443: connect: connection refused" interval="200ms" Sep 13 00:27:16.378147 kubelet[2224]: E0913 00:27:16.378091 2224 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": dial tcp 172.31.25.123:6443: connect: connection refused" interval="400ms" Sep 13 00:27:16.732343 kubelet[2224]: E0913 00:27:16.732299 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:16.779637 kubelet[2224]: E0913 00:27:16.779584 2224 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": dial tcp 172.31.25.123:6443: connect: connection refused" interval="800ms" Sep 13 00:27:17.733288 kubelet[2224]: E0913 00:27:17.733243 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:18.734624 kubelet[2224]: E0913 00:27:18.734553 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:19.597490 kubelet[2224]: E0913 00:27:19.597430 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:19.734792 kubelet[2224]: E0913 00:27:19.734738 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:20.735774 kubelet[2224]: E0913 00:27:20.735653 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:21.736245 kubelet[2224]: E0913 00:27:21.736202 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:22.738050 kubelet[2224]: E0913 00:27:22.737898 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:23.738064 kubelet[2224]: E0913 00:27:23.738026 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:24.739757 kubelet[2224]: E0913 00:27:24.739687 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:25.740440 kubelet[2224]: E0913 00:27:25.740381 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:26.741052 kubelet[2224]: E0913 00:27:26.740993 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:27.581028 kubelet[2224]: E0913 00:27:27.580931 2224 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Sep 13 00:27:27.741485 kubelet[2224]: E0913 00:27:27.741415 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:28.742114 kubelet[2224]: E0913 00:27:28.742068 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:29.742813 kubelet[2224]: E0913 00:27:29.742771 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:30.743657 kubelet[2224]: E0913 00:27:30.743603 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:31.156179 systemd[1]: run-containerd-runc-k8s.io-10d9b4b32e4c1ae9bfb8c0dee80f10cc41105c0ed8efdbf0e86a8626a46963d0-runc.prtPNp.mount: Deactivated successfully. Sep 13 00:27:31.744502 kubelet[2224]: E0913 00:27:31.744462 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:32.745545 kubelet[2224]: E0913 00:27:32.745479 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:33.745667 kubelet[2224]: E0913 00:27:33.745599 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:34.746205 kubelet[2224]: E0913 00:27:34.746130 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:35.746642 kubelet[2224]: E0913 00:27:35.746596 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:36.748344 kubelet[2224]: E0913 00:27:36.748277 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:37.749431 kubelet[2224]: E0913 00:27:37.749366 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:38.750593 kubelet[2224]: E0913 00:27:38.750525 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:39.182504 kubelet[2224]: E0913 00:27:39.182426 2224 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.123:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.159?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="3.2s" Sep 13 00:27:39.597079 kubelet[2224]: E0913 00:27:39.597042 2224 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:39.750986 kubelet[2224]: E0913 00:27:39.750864 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:27:40.752097 kubelet[2224]: E0913 00:27:40.752026 2224 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"