Nov 1 00:14:15.010183 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Nov 1 00:14:15.010219 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Oct 31 23:12:38 -00 2025 Nov 1 00:14:15.010242 kernel: efi: EFI v2.70 by EDK II Nov 1 00:14:15.010257 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Nov 1 00:14:15.010270 kernel: ACPI: Early table checksum verification disabled Nov 1 00:14:15.010284 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Nov 1 00:14:15.010300 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Nov 1 00:14:15.010314 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Nov 1 00:14:15.010327 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Nov 1 00:14:15.010341 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Nov 1 00:14:15.010359 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Nov 1 00:14:15.010372 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Nov 1 00:14:15.010386 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Nov 1 00:14:15.010400 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Nov 1 00:14:15.010416 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Nov 1 00:14:15.010435 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Nov 1 00:14:15.010449 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Nov 1 00:14:15.010464 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Nov 1 00:14:15.010499 kernel: printk: bootconsole [uart0] enabled Nov 1 00:14:15.010515 kernel: NUMA: Failed to initialise from firmware Nov 1 00:14:15.010531 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Nov 1 00:14:15.010545 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Nov 1 00:14:15.010560 kernel: Zone ranges: Nov 1 00:14:15.010575 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Nov 1 00:14:15.010589 kernel: DMA32 empty Nov 1 00:14:15.010603 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Nov 1 00:14:15.010623 kernel: Movable zone start for each node Nov 1 00:14:15.010637 kernel: Early memory node ranges Nov 1 00:14:15.010652 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Nov 1 00:14:15.010666 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Nov 1 00:14:15.010681 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Nov 1 00:14:15.010695 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Nov 1 00:14:15.010709 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Nov 1 00:14:15.010723 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Nov 1 00:14:15.010738 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Nov 1 00:14:15.010752 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Nov 1 00:14:15.010767 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Nov 1 00:14:15.010781 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Nov 1 00:14:15.010800 kernel: psci: probing for conduit method from ACPI. Nov 1 00:14:15.010815 kernel: psci: PSCIv1.0 detected in firmware. Nov 1 00:14:15.010836 kernel: psci: Using standard PSCI v0.2 function IDs Nov 1 00:14:15.010851 kernel: psci: Trusted OS migration not required Nov 1 00:14:15.010866 kernel: psci: SMC Calling Convention v1.1 Nov 1 00:14:15.010886 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Nov 1 00:14:15.010901 kernel: ACPI: SRAT not present Nov 1 00:14:15.010916 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Nov 1 00:14:15.010932 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Nov 1 00:14:15.010947 kernel: pcpu-alloc: [0] 0 [0] 1 Nov 1 00:14:15.010962 kernel: Detected PIPT I-cache on CPU0 Nov 1 00:14:15.010977 kernel: CPU features: detected: GIC system register CPU interface Nov 1 00:14:15.010992 kernel: CPU features: detected: Spectre-v2 Nov 1 00:14:15.011007 kernel: CPU features: detected: Spectre-v3a Nov 1 00:14:15.011022 kernel: CPU features: detected: Spectre-BHB Nov 1 00:14:15.011037 kernel: CPU features: kernel page table isolation forced ON by KASLR Nov 1 00:14:15.011056 kernel: CPU features: detected: Kernel page table isolation (KPTI) Nov 1 00:14:15.011072 kernel: CPU features: detected: ARM erratum 1742098 Nov 1 00:14:15.011087 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Nov 1 00:14:15.011102 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Nov 1 00:14:15.011117 kernel: Policy zone: Normal Nov 1 00:14:15.011134 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=284392058f112e827cd7c521dcce1be27e1367d0030df494642d12e41e342e29 Nov 1 00:14:15.011150 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:14:15.011166 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Nov 1 00:14:15.011181 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:14:15.011196 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:14:15.011214 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Nov 1 00:14:15.011230 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Nov 1 00:14:15.011246 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Nov 1 00:14:15.011261 kernel: trace event string verifier disabled Nov 1 00:14:15.011275 kernel: rcu: Preemptible hierarchical RCU implementation. Nov 1 00:14:15.011291 kernel: rcu: RCU event tracing is enabled. Nov 1 00:14:15.011306 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Nov 1 00:14:15.011322 kernel: Trampoline variant of Tasks RCU enabled. Nov 1 00:14:15.011337 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:14:15.011352 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:14:15.011381 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Nov 1 00:14:15.011403 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Nov 1 00:14:15.011423 kernel: GICv3: 96 SPIs implemented Nov 1 00:14:15.011439 kernel: GICv3: 0 Extended SPIs implemented Nov 1 00:14:15.011453 kernel: GICv3: Distributor has no Range Selector support Nov 1 00:14:15.011544 kernel: Root IRQ handler: gic_handle_irq Nov 1 00:14:15.011568 kernel: GICv3: 16 PPIs implemented Nov 1 00:14:15.011583 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Nov 1 00:14:15.011598 kernel: ACPI: SRAT not present Nov 1 00:14:15.011613 kernel: ITS [mem 0x10080000-0x1009ffff] Nov 1 00:14:15.011628 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Nov 1 00:14:15.011644 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Nov 1 00:14:15.011659 kernel: GICv3: using LPI property table @0x00000004000b0000 Nov 1 00:14:15.011680 kernel: ITS: Using hypervisor restricted LPI range [128] Nov 1 00:14:15.011696 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Nov 1 00:14:15.011711 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Nov 1 00:14:15.011727 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Nov 1 00:14:15.011742 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Nov 1 00:14:15.011757 kernel: Console: colour dummy device 80x25 Nov 1 00:14:15.011772 kernel: printk: console [tty1] enabled Nov 1 00:14:15.011788 kernel: ACPI: Core revision 20210730 Nov 1 00:14:15.011804 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Nov 1 00:14:15.011820 kernel: pid_max: default: 32768 minimum: 301 Nov 1 00:14:15.011839 kernel: LSM: Security Framework initializing Nov 1 00:14:15.011855 kernel: SELinux: Initializing. Nov 1 00:14:15.011871 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Nov 1 00:14:15.011887 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Nov 1 00:14:15.011902 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:14:15.011918 kernel: Platform MSI: ITS@0x10080000 domain created Nov 1 00:14:15.011956 kernel: PCI/MSI: ITS@0x10080000 domain created Nov 1 00:14:15.011978 kernel: Remapping and enabling EFI services. Nov 1 00:14:15.011994 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:14:15.012010 kernel: Detected PIPT I-cache on CPU1 Nov 1 00:14:15.012046 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Nov 1 00:14:15.012062 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Nov 1 00:14:15.012078 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Nov 1 00:14:15.012093 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 00:14:15.012108 kernel: SMP: Total of 2 processors activated. Nov 1 00:14:15.012124 kernel: CPU features: detected: 32-bit EL0 Support Nov 1 00:14:15.012139 kernel: CPU features: detected: 32-bit EL1 Support Nov 1 00:14:15.012155 kernel: CPU features: detected: CRC32 instructions Nov 1 00:14:15.012171 kernel: CPU: All CPU(s) started at EL1 Nov 1 00:14:15.012191 kernel: alternatives: patching kernel code Nov 1 00:14:15.012207 kernel: devtmpfs: initialized Nov 1 00:14:15.012233 kernel: KASLR disabled due to lack of seed Nov 1 00:14:15.012253 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:14:15.012270 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Nov 1 00:14:15.012285 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:14:15.012301 kernel: SMBIOS 3.0.0 present. Nov 1 00:14:15.012317 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Nov 1 00:14:15.012333 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:14:15.012349 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Nov 1 00:14:15.012366 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Nov 1 00:14:15.012387 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Nov 1 00:14:15.012403 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:14:15.012419 kernel: audit: type=2000 audit(0.293:1): state=initialized audit_enabled=0 res=1 Nov 1 00:14:15.012436 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:14:15.012451 kernel: cpuidle: using governor menu Nov 1 00:14:15.012494 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Nov 1 00:14:15.012515 kernel: ASID allocator initialised with 32768 entries Nov 1 00:14:15.012531 kernel: ACPI: bus type PCI registered Nov 1 00:14:15.012547 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:14:15.012563 kernel: Serial: AMBA PL011 UART driver Nov 1 00:14:15.012579 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 00:14:15.012596 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Nov 1 00:14:15.012612 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:14:15.012628 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Nov 1 00:14:15.012650 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:14:15.012666 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Nov 1 00:14:15.012682 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:14:15.012698 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:14:15.012714 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:14:15.012730 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:14:15.012746 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:14:15.015407 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:14:15.015432 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 1 00:14:15.015448 kernel: ACPI: Interpreter enabled Nov 1 00:14:15.015524 kernel: ACPI: Using GIC for interrupt routing Nov 1 00:14:15.015544 kernel: ACPI: MCFG table detected, 1 entries Nov 1 00:14:15.015561 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Nov 1 00:14:15.015857 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Nov 1 00:14:15.016055 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Nov 1 00:14:15.016247 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Nov 1 00:14:15.016438 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Nov 1 00:14:15.016746 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Nov 1 00:14:15.016772 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Nov 1 00:14:15.016789 kernel: acpiphp: Slot [1] registered Nov 1 00:14:15.022979 kernel: acpiphp: Slot [2] registered Nov 1 00:14:15.023013 kernel: acpiphp: Slot [3] registered Nov 1 00:14:15.023030 kernel: acpiphp: Slot [4] registered Nov 1 00:14:15.023047 kernel: acpiphp: Slot [5] registered Nov 1 00:14:15.023063 kernel: acpiphp: Slot [6] registered Nov 1 00:14:15.023079 kernel: acpiphp: Slot [7] registered Nov 1 00:14:15.023105 kernel: acpiphp: Slot [8] registered Nov 1 00:14:15.023121 kernel: acpiphp: Slot [9] registered Nov 1 00:14:15.023136 kernel: acpiphp: Slot [10] registered Nov 1 00:14:15.023152 kernel: acpiphp: Slot [11] registered Nov 1 00:14:15.023168 kernel: acpiphp: Slot [12] registered Nov 1 00:14:15.023184 kernel: acpiphp: Slot [13] registered Nov 1 00:14:15.023200 kernel: acpiphp: Slot [14] registered Nov 1 00:14:15.023216 kernel: acpiphp: Slot [15] registered Nov 1 00:14:15.023232 kernel: acpiphp: Slot [16] registered Nov 1 00:14:15.023252 kernel: acpiphp: Slot [17] registered Nov 1 00:14:15.023269 kernel: acpiphp: Slot [18] registered Nov 1 00:14:15.023285 kernel: acpiphp: Slot [19] registered Nov 1 00:14:15.023301 kernel: acpiphp: Slot [20] registered Nov 1 00:14:15.023317 kernel: acpiphp: Slot [21] registered Nov 1 00:14:15.023333 kernel: acpiphp: Slot [22] registered Nov 1 00:14:15.023348 kernel: acpiphp: Slot [23] registered Nov 1 00:14:15.023364 kernel: acpiphp: Slot [24] registered Nov 1 00:14:15.023407 kernel: acpiphp: Slot [25] registered Nov 1 00:14:15.023424 kernel: acpiphp: Slot [26] registered Nov 1 00:14:15.023447 kernel: acpiphp: Slot [27] registered Nov 1 00:14:15.023462 kernel: acpiphp: Slot [28] registered Nov 1 00:14:15.023517 kernel: acpiphp: Slot [29] registered Nov 1 00:14:15.023535 kernel: acpiphp: Slot [30] registered Nov 1 00:14:15.023552 kernel: acpiphp: Slot [31] registered Nov 1 00:14:15.023568 kernel: PCI host bridge to bus 0000:00 Nov 1 00:14:15.023824 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Nov 1 00:14:15.024011 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Nov 1 00:14:15.024196 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Nov 1 00:14:15.024374 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Nov 1 00:14:15.024648 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Nov 1 00:14:15.024869 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Nov 1 00:14:15.025070 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Nov 1 00:14:15.025277 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Nov 1 00:14:15.025527 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Nov 1 00:14:15.025738 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Nov 1 00:14:15.025957 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Nov 1 00:14:15.026159 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Nov 1 00:14:15.026356 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Nov 1 00:14:15.026586 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Nov 1 00:14:15.026791 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Nov 1 00:14:15.027010 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Nov 1 00:14:15.027220 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Nov 1 00:14:15.027445 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Nov 1 00:14:15.044136 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Nov 1 00:14:15.044374 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Nov 1 00:14:15.044612 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Nov 1 00:14:15.044794 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Nov 1 00:14:15.044981 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Nov 1 00:14:15.045004 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Nov 1 00:14:15.045022 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Nov 1 00:14:15.045039 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Nov 1 00:14:15.045055 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Nov 1 00:14:15.045071 kernel: iommu: Default domain type: Translated Nov 1 00:14:15.045087 kernel: iommu: DMA domain TLB invalidation policy: strict mode Nov 1 00:14:15.045104 kernel: vgaarb: loaded Nov 1 00:14:15.045120 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:14:15.045141 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:14:15.045158 kernel: PTP clock support registered Nov 1 00:14:15.045174 kernel: Registered efivars operations Nov 1 00:14:15.045190 kernel: clocksource: Switched to clocksource arch_sys_counter Nov 1 00:14:15.045206 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:14:15.045222 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:14:15.045238 kernel: pnp: PnP ACPI init Nov 1 00:14:15.045452 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Nov 1 00:14:15.045511 kernel: pnp: PnP ACPI: found 1 devices Nov 1 00:14:15.045530 kernel: NET: Registered PF_INET protocol family Nov 1 00:14:15.045547 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Nov 1 00:14:15.045564 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Nov 1 00:14:15.045580 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:14:15.045597 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 1 00:14:15.045614 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Nov 1 00:14:15.045630 kernel: TCP: Hash tables configured (established 32768 bind 32768) Nov 1 00:14:15.045647 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Nov 1 00:14:15.045668 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Nov 1 00:14:15.045685 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:14:15.045701 kernel: PCI: CLS 0 bytes, default 64 Nov 1 00:14:15.045717 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Nov 1 00:14:15.045733 kernel: kvm [1]: HYP mode not available Nov 1 00:14:15.045749 kernel: Initialise system trusted keyrings Nov 1 00:14:15.045766 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Nov 1 00:14:15.045782 kernel: Key type asymmetric registered Nov 1 00:14:15.045798 kernel: Asymmetric key parser 'x509' registered Nov 1 00:14:15.045817 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:14:15.045834 kernel: io scheduler mq-deadline registered Nov 1 00:14:15.045850 kernel: io scheduler kyber registered Nov 1 00:14:15.045866 kernel: io scheduler bfq registered Nov 1 00:14:15.046069 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Nov 1 00:14:15.046094 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Nov 1 00:14:15.046111 kernel: ACPI: button: Power Button [PWRB] Nov 1 00:14:15.046127 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Nov 1 00:14:15.046143 kernel: ACPI: button: Sleep Button [SLPB] Nov 1 00:14:15.046165 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:14:15.046181 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Nov 1 00:14:15.046383 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Nov 1 00:14:15.046407 kernel: printk: console [ttyS0] disabled Nov 1 00:14:15.046423 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Nov 1 00:14:15.046440 kernel: printk: console [ttyS0] enabled Nov 1 00:14:15.046456 kernel: printk: bootconsole [uart0] disabled Nov 1 00:14:15.046490 kernel: thunder_xcv, ver 1.0 Nov 1 00:14:15.046511 kernel: thunder_bgx, ver 1.0 Nov 1 00:14:15.046532 kernel: nicpf, ver 1.0 Nov 1 00:14:15.046548 kernel: nicvf, ver 1.0 Nov 1 00:14:15.046754 kernel: rtc-efi rtc-efi.0: registered as rtc0 Nov 1 00:14:15.046940 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-11-01T00:14:14 UTC (1761956054) Nov 1 00:14:15.046963 kernel: hid: raw HID events driver (C) Jiri Kosina Nov 1 00:14:15.046980 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:14:15.046996 kernel: Segment Routing with IPv6 Nov 1 00:14:15.047012 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:14:15.047033 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:14:15.047049 kernel: Key type dns_resolver registered Nov 1 00:14:15.047065 kernel: registered taskstats version 1 Nov 1 00:14:15.047081 kernel: Loading compiled-in X.509 certificates Nov 1 00:14:15.047098 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 4aa5071b9a6f96878595e36d4bd5862a671c915d' Nov 1 00:14:15.047114 kernel: Key type .fscrypt registered Nov 1 00:14:15.047130 kernel: Key type fscrypt-provisioning registered Nov 1 00:14:15.047146 kernel: ima: No TPM chip found, activating TPM-bypass! Nov 1 00:14:15.047162 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:14:15.047182 kernel: ima: No architecture policies found Nov 1 00:14:15.047198 kernel: clk: Disabling unused clocks Nov 1 00:14:15.047214 kernel: Freeing unused kernel memory: 36416K Nov 1 00:14:15.047230 kernel: Run /init as init process Nov 1 00:14:15.047247 kernel: with arguments: Nov 1 00:14:15.047263 kernel: /init Nov 1 00:14:15.047278 kernel: with environment: Nov 1 00:14:15.047294 kernel: HOME=/ Nov 1 00:14:15.047309 kernel: TERM=linux Nov 1 00:14:15.047329 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:14:15.047350 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:14:15.047389 systemd[1]: Detected virtualization amazon. Nov 1 00:14:15.047412 systemd[1]: Detected architecture arm64. Nov 1 00:14:15.047429 systemd[1]: Running in initrd. Nov 1 00:14:15.047446 systemd[1]: No hostname configured, using default hostname. Nov 1 00:14:15.047463 systemd[1]: Hostname set to . Nov 1 00:14:15.047516 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:14:15.047534 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:14:15.047551 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:14:15.047568 systemd[1]: Reached target cryptsetup.target. Nov 1 00:14:15.047585 systemd[1]: Reached target paths.target. Nov 1 00:14:15.047602 systemd[1]: Reached target slices.target. Nov 1 00:14:15.047619 systemd[1]: Reached target swap.target. Nov 1 00:14:15.047636 systemd[1]: Reached target timers.target. Nov 1 00:14:15.047659 systemd[1]: Listening on iscsid.socket. Nov 1 00:14:15.047676 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:14:15.047693 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:14:15.047711 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:14:15.047728 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:14:15.047745 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:14:15.047762 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:14:15.047793 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:14:15.047819 systemd[1]: Reached target sockets.target. Nov 1 00:14:15.047837 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:14:15.047854 systemd[1]: Finished network-cleanup.service. Nov 1 00:14:15.047872 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:14:15.047889 systemd[1]: Starting systemd-journald.service... Nov 1 00:14:15.047907 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:14:15.047924 systemd[1]: Starting systemd-resolved.service... Nov 1 00:14:15.047942 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:14:15.047959 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:14:15.047981 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:14:15.047998 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:14:15.048015 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:14:15.048032 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:14:15.048049 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:14:15.048068 kernel: audit: type=1130 audit(1761956055.035:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.048089 systemd-journald[309]: Journal started Nov 1 00:14:15.048185 systemd-journald[309]: Runtime Journal (/run/log/journal/ec2a442fdc43277d2cea5c2341fa100d) is 8.0M, max 75.4M, 67.4M free. Nov 1 00:14:15.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:14.977936 systemd-modules-load[310]: Inserted module 'overlay' Nov 1 00:14:15.063483 systemd[1]: Started systemd-journald.service. Nov 1 00:14:15.063526 kernel: audit: type=1130 audit(1761956055.052:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.072938 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:14:15.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.090776 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:14:15.097099 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:14:15.097133 kernel: audit: type=1130 audit(1761956055.078:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.100095 systemd-resolved[311]: Positive Trust Anchors: Nov 1 00:14:15.102347 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:14:15.107655 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:14:15.123208 kernel: Bridge firewalling registered Nov 1 00:14:15.121644 systemd-modules-load[310]: Inserted module 'br_netfilter' Nov 1 00:14:15.135041 dracut-cmdline[326]: dracut-dracut-053 Nov 1 00:14:15.141976 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=284392058f112e827cd7c521dcce1be27e1367d0030df494642d12e41e342e29 Nov 1 00:14:15.158502 kernel: SCSI subsystem initialized Nov 1 00:14:15.179079 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:14:15.179176 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:14:15.183078 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:14:15.189195 systemd-modules-load[310]: Inserted module 'dm_multipath' Nov 1 00:14:15.193182 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:14:15.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.197154 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:14:15.211520 kernel: audit: type=1130 audit(1761956055.193:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.225605 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:14:15.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.237521 kernel: audit: type=1130 audit(1761956055.226:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.322499 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:14:15.341508 kernel: iscsi: registered transport (tcp) Nov 1 00:14:15.369781 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:14:15.369851 kernel: QLogic iSCSI HBA Driver Nov 1 00:14:15.559509 kernel: random: crng init done Nov 1 00:14:15.559781 systemd-resolved[311]: Defaulting to hostname 'linux'. Nov 1 00:14:15.563848 systemd[1]: Started systemd-resolved.service. Nov 1 00:14:15.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.565678 systemd[1]: Reached target nss-lookup.target. Nov 1 00:14:15.578770 kernel: audit: type=1130 audit(1761956055.562:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.593414 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:14:15.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.598507 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:14:15.609467 kernel: audit: type=1130 audit(1761956055.595:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:15.664511 kernel: raid6: neonx8 gen() 6338 MB/s Nov 1 00:14:15.682510 kernel: raid6: neonx8 xor() 4787 MB/s Nov 1 00:14:15.700505 kernel: raid6: neonx4 gen() 6464 MB/s Nov 1 00:14:15.718505 kernel: raid6: neonx4 xor() 4993 MB/s Nov 1 00:14:15.736504 kernel: raid6: neonx2 gen() 5721 MB/s Nov 1 00:14:15.754506 kernel: raid6: neonx2 xor() 4568 MB/s Nov 1 00:14:15.772506 kernel: raid6: neonx1 gen() 4422 MB/s Nov 1 00:14:15.790503 kernel: raid6: neonx1 xor() 3697 MB/s Nov 1 00:14:15.808505 kernel: raid6: int64x8 gen() 3394 MB/s Nov 1 00:14:15.826504 kernel: raid6: int64x8 xor() 2092 MB/s Nov 1 00:14:15.844506 kernel: raid6: int64x4 gen() 3769 MB/s Nov 1 00:14:15.862506 kernel: raid6: int64x4 xor() 2194 MB/s Nov 1 00:14:15.880507 kernel: raid6: int64x2 gen() 3575 MB/s Nov 1 00:14:15.898507 kernel: raid6: int64x2 xor() 1948 MB/s Nov 1 00:14:15.916508 kernel: raid6: int64x1 gen() 2753 MB/s Nov 1 00:14:15.936031 kernel: raid6: int64x1 xor() 1451 MB/s Nov 1 00:14:15.936062 kernel: raid6: using algorithm neonx4 gen() 6464 MB/s Nov 1 00:14:15.936086 kernel: raid6: .... xor() 4993 MB/s, rmw enabled Nov 1 00:14:15.937872 kernel: raid6: using neon recovery algorithm Nov 1 00:14:15.956514 kernel: xor: measuring software checksum speed Nov 1 00:14:15.958504 kernel: 8regs : 8794 MB/sec Nov 1 00:14:15.960505 kernel: 32regs : 10153 MB/sec Nov 1 00:14:15.960534 kernel: arm64_neon : 8728 MB/sec Nov 1 00:14:15.964058 kernel: xor: using function: 32regs (10153 MB/sec) Nov 1 00:14:16.060530 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Nov 1 00:14:16.078049 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:14:16.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:16.087000 audit: BPF prog-id=7 op=LOAD Nov 1 00:14:16.091547 kernel: audit: type=1130 audit(1761956056.078:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:16.091605 kernel: audit: type=1334 audit(1761956056.087:10): prog-id=7 op=LOAD Nov 1 00:14:16.089603 systemd[1]: Starting systemd-udevd.service... Nov 1 00:14:16.087000 audit: BPF prog-id=8 op=LOAD Nov 1 00:14:16.121356 systemd-udevd[509]: Using default interface naming scheme 'v252'. Nov 1 00:14:16.132548 systemd[1]: Started systemd-udevd.service. Nov 1 00:14:16.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:16.135963 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:14:16.167906 dracut-pre-trigger[514]: rd.md=0: removing MD RAID activation Nov 1 00:14:16.227346 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:14:16.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:16.232341 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:14:16.331174 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:14:16.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:16.457505 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Nov 1 00:14:16.457581 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Nov 1 00:14:16.461116 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Nov 1 00:14:16.485508 kernel: nvme nvme0: pci function 0000:00:04.0 Nov 1 00:14:16.485836 kernel: ena 0000:00:05.0: ENA device version: 0.10 Nov 1 00:14:16.486118 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Nov 1 00:14:16.486358 kernel: nvme nvme0: 2/0/0 default/read/poll queues Nov 1 00:14:16.486680 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:7d:91:e8:3b:f1 Nov 1 00:14:16.493503 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 1 00:14:16.493585 kernel: GPT:9289727 != 33554431 Nov 1 00:14:16.493609 kernel: GPT:Alternate GPT header not at the end of the disk. Nov 1 00:14:16.495787 kernel: GPT:9289727 != 33554431 Nov 1 00:14:16.499139 kernel: GPT: Use GNU Parted to correct GPT errors. Nov 1 00:14:16.499226 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:14:16.505096 (udev-worker)[560]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:14:16.588524 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (564) Nov 1 00:14:16.653315 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:14:16.672346 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:14:16.677823 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:14:16.685811 systemd[1]: Starting disk-uuid.service... Nov 1 00:14:16.705618 disk-uuid[651]: Primary Header is updated. Nov 1 00:14:16.705618 disk-uuid[651]: Secondary Entries is updated. Nov 1 00:14:16.705618 disk-uuid[651]: Secondary Header is updated. Nov 1 00:14:16.756355 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:14:16.775184 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:14:17.736517 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:14:17.736787 disk-uuid[657]: The operation has completed successfully. Nov 1 00:14:17.944388 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:14:17.947197 systemd[1]: Finished disk-uuid.service. Nov 1 00:14:17.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:17.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:17.963042 systemd[1]: Starting verity-setup.service... Nov 1 00:14:18.004613 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Nov 1 00:14:18.112545 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:14:18.118278 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:14:18.122582 systemd[1]: Finished verity-setup.service. Nov 1 00:14:18.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:18.226734 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:14:18.227422 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:14:18.230933 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 00:14:18.232305 systemd[1]: Starting ignition-setup.service... Nov 1 00:14:18.242171 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:14:18.284849 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:14:18.284922 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:14:18.284946 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:14:18.330523 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:14:18.351436 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 00:14:18.367971 systemd[1]: Finished ignition-setup.service. Nov 1 00:14:18.372105 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:14:18.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:18.415126 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:14:18.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:18.418000 audit: BPF prog-id=9 op=LOAD Nov 1 00:14:18.421291 systemd[1]: Starting systemd-networkd.service... Nov 1 00:14:18.468885 systemd-networkd[1176]: lo: Link UP Nov 1 00:14:18.468909 systemd-networkd[1176]: lo: Gained carrier Nov 1 00:14:18.472936 systemd-networkd[1176]: Enumeration completed Nov 1 00:14:18.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:18.473451 systemd-networkd[1176]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:14:18.473740 systemd[1]: Started systemd-networkd.service. Nov 1 00:14:18.475863 systemd[1]: Reached target network.target. Nov 1 00:14:18.480377 systemd[1]: Starting iscsiuio.service... Nov 1 00:14:18.502041 systemd-networkd[1176]: eth0: Link UP Nov 1 00:14:18.502057 systemd-networkd[1176]: eth0: Gained carrier Nov 1 00:14:18.508087 systemd[1]: Started iscsiuio.service. Nov 1 00:14:18.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:18.511759 systemd[1]: Starting iscsid.service... Nov 1 00:14:18.526666 systemd-networkd[1176]: eth0: DHCPv4 address 172.31.24.1/20, gateway 172.31.16.1 acquired from 172.31.16.1 Nov 1 00:14:18.533426 iscsid[1181]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:14:18.533426 iscsid[1181]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:14:18.533426 iscsid[1181]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:14:18.533426 iscsid[1181]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:14:18.533426 iscsid[1181]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:14:18.533426 iscsid[1181]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:14:18.561065 systemd[1]: Started iscsid.service. Nov 1 00:14:18.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:18.565837 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:14:18.591129 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:14:18.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:18.593547 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:14:18.598730 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:14:18.602407 systemd[1]: Reached target remote-fs.target. Nov 1 00:14:18.607337 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:14:18.627612 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:14:18.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.127671 ignition[1150]: Ignition 2.14.0 Nov 1 00:14:19.127701 ignition[1150]: Stage: fetch-offline Nov 1 00:14:19.129762 ignition[1150]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:19.131093 ignition[1150]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:19.152208 ignition[1150]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:19.155503 ignition[1150]: Ignition finished successfully Nov 1 00:14:19.158913 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:14:19.174092 kernel: kauditd_printk_skb: 15 callbacks suppressed Nov 1 00:14:19.174131 kernel: audit: type=1130 audit(1761956059.157:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.171573 systemd[1]: Starting ignition-fetch.service... Nov 1 00:14:19.186402 ignition[1200]: Ignition 2.14.0 Nov 1 00:14:19.186430 ignition[1200]: Stage: fetch Nov 1 00:14:19.186856 ignition[1200]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:19.187380 ignition[1200]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:19.202865 ignition[1200]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:19.205496 ignition[1200]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:19.215729 ignition[1200]: INFO : PUT result: OK Nov 1 00:14:19.219575 ignition[1200]: DEBUG : parsed url from cmdline: "" Nov 1 00:14:19.221631 ignition[1200]: INFO : no config URL provided Nov 1 00:14:19.221631 ignition[1200]: INFO : reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:14:19.221631 ignition[1200]: INFO : no config at "/usr/lib/ignition/user.ign" Nov 1 00:14:19.221631 ignition[1200]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:19.231575 ignition[1200]: INFO : PUT result: OK Nov 1 00:14:19.231575 ignition[1200]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Nov 1 00:14:19.237649 ignition[1200]: INFO : GET result: OK Nov 1 00:14:19.237649 ignition[1200]: DEBUG : parsing config with SHA512: 84076df4e8c60b008486e35ba93ba6e58c082e6399f7b8c5a9bf90c3c8f648b2b629213a85df33437a719b689abed34045245bbfc3870d1d6cdd65418dfaf63b Nov 1 00:14:19.244603 unknown[1200]: fetched base config from "system" Nov 1 00:14:19.244623 unknown[1200]: fetched base config from "system" Nov 1 00:14:19.244638 unknown[1200]: fetched user config from "aws" Nov 1 00:14:19.254214 ignition[1200]: fetch: fetch complete Nov 1 00:14:19.254258 ignition[1200]: fetch: fetch passed Nov 1 00:14:19.254391 ignition[1200]: Ignition finished successfully Nov 1 00:14:19.261597 systemd[1]: Finished ignition-fetch.service. Nov 1 00:14:19.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.266454 systemd[1]: Starting ignition-kargs.service... Nov 1 00:14:19.275771 kernel: audit: type=1130 audit(1761956059.263:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.290861 ignition[1206]: Ignition 2.14.0 Nov 1 00:14:19.290888 ignition[1206]: Stage: kargs Nov 1 00:14:19.291193 ignition[1206]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:19.291253 ignition[1206]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:19.307336 ignition[1206]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:19.309831 ignition[1206]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:19.313443 ignition[1206]: INFO : PUT result: OK Nov 1 00:14:19.318904 ignition[1206]: kargs: kargs passed Nov 1 00:14:19.319243 ignition[1206]: Ignition finished successfully Nov 1 00:14:19.325068 systemd[1]: Finished ignition-kargs.service. Nov 1 00:14:19.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.337721 systemd[1]: Starting ignition-disks.service... Nov 1 00:14:19.349444 kernel: audit: type=1130 audit(1761956059.327:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.357360 ignition[1212]: Ignition 2.14.0 Nov 1 00:14:19.357389 ignition[1212]: Stage: disks Nov 1 00:14:19.357786 ignition[1212]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:19.357846 ignition[1212]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:19.371313 ignition[1212]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:19.374133 ignition[1212]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:19.377933 ignition[1212]: INFO : PUT result: OK Nov 1 00:14:19.387019 ignition[1212]: disks: disks passed Nov 1 00:14:19.387357 ignition[1212]: Ignition finished successfully Nov 1 00:14:19.392942 systemd[1]: Finished ignition-disks.service. Nov 1 00:14:19.419671 kernel: audit: type=1130 audit(1761956059.391:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.393353 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:14:19.394006 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:14:19.394814 systemd[1]: Reached target local-fs.target. Nov 1 00:14:19.404333 systemd[1]: Reached target sysinit.target. Nov 1 00:14:19.405137 systemd[1]: Reached target basic.target. Nov 1 00:14:19.407683 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:14:19.463071 systemd-fsck[1220]: ROOT: clean, 637/553520 files, 56031/553472 blocks Nov 1 00:14:19.469552 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:14:19.482809 kernel: audit: type=1130 audit(1761956059.470:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.474335 systemd[1]: Mounting sysroot.mount... Nov 1 00:14:19.503517 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:14:19.506625 systemd[1]: Mounted sysroot.mount. Nov 1 00:14:19.511519 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:14:19.524768 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:14:19.532181 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Nov 1 00:14:19.532288 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:14:19.532345 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:14:19.544521 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:14:19.556420 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:14:19.564928 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:14:19.586751 initrd-setup-root[1242]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:14:19.590907 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1237) Nov 1 00:14:19.597765 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:14:19.597837 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:14:19.600459 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:14:19.600572 initrd-setup-root[1250]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:14:19.610096 initrd-setup-root[1274]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:14:19.616517 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:14:19.622641 initrd-setup-root[1284]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:14:19.631855 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:14:19.807772 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:14:19.818720 kernel: audit: type=1130 audit(1761956059.806:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.820159 systemd[1]: Starting ignition-mount.service... Nov 1 00:14:19.831947 systemd[1]: Starting sysroot-boot.service... Nov 1 00:14:19.844718 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Nov 1 00:14:19.847413 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Nov 1 00:14:19.872982 ignition[1303]: INFO : Ignition 2.14.0 Nov 1 00:14:19.872982 ignition[1303]: INFO : Stage: mount Nov 1 00:14:19.877318 ignition[1303]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:19.877318 ignition[1303]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:19.896613 ignition[1303]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:19.902211 systemd[1]: Finished sysroot-boot.service. Nov 1 00:14:19.914671 kernel: audit: type=1130 audit(1761956059.903:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.914784 ignition[1303]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:19.914784 ignition[1303]: INFO : PUT result: OK Nov 1 00:14:19.921722 ignition[1303]: INFO : mount: mount passed Nov 1 00:14:19.923595 ignition[1303]: INFO : Ignition finished successfully Nov 1 00:14:19.927113 systemd[1]: Finished ignition-mount.service. Nov 1 00:14:19.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.934725 systemd[1]: Starting ignition-files.service... Nov 1 00:14:19.944070 kernel: audit: type=1130 audit(1761956059.932:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:19.952899 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:14:19.978533 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1313) Nov 1 00:14:19.985525 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:14:19.985591 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:14:19.985615 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:14:20.026527 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:14:20.032258 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:14:20.053786 ignition[1332]: INFO : Ignition 2.14.0 Nov 1 00:14:20.055842 ignition[1332]: INFO : Stage: files Nov 1 00:14:20.055842 ignition[1332]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:20.055842 ignition[1332]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:20.073371 ignition[1332]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:20.076183 ignition[1332]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:20.079773 ignition[1332]: INFO : PUT result: OK Nov 1 00:14:20.085158 ignition[1332]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:14:20.094997 ignition[1332]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:14:20.100509 ignition[1332]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:14:20.118224 ignition[1332]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:14:20.121401 ignition[1332]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:14:20.125704 unknown[1332]: wrote ssh authorized keys file for user: core Nov 1 00:14:20.128253 ignition[1332]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:14:20.132144 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Nov 1 00:14:20.136096 ignition[1332]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:20.154841 systemd-networkd[1176]: eth0: Gained IPv6LL Nov 1 00:14:20.162208 ignition[1332]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1565410490" Nov 1 00:14:20.167266 ignition[1332]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1565410490": device or resource busy Nov 1 00:14:20.167266 ignition[1332]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1565410490", trying btrfs: device or resource busy Nov 1 00:14:20.167266 ignition[1332]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1565410490" Nov 1 00:14:20.167266 ignition[1332]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1565410490" Nov 1 00:14:20.188844 ignition[1332]: INFO : op(3): [started] unmounting "/mnt/oem1565410490" Nov 1 00:14:20.195598 ignition[1332]: INFO : op(3): [finished] unmounting "/mnt/oem1565410490" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:14:20.195598 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Nov 1 00:14:20.195598 ignition[1332]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:20.255586 ignition[1332]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2524974741" Nov 1 00:14:20.255586 ignition[1332]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2524974741": device or resource busy Nov 1 00:14:20.255586 ignition[1332]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2524974741", trying btrfs: device or resource busy Nov 1 00:14:20.255586 ignition[1332]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2524974741" Nov 1 00:14:20.255586 ignition[1332]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2524974741" Nov 1 00:14:20.255586 ignition[1332]: INFO : op(6): [started] unmounting "/mnt/oem2524974741" Nov 1 00:14:20.255586 ignition[1332]: INFO : op(6): [finished] unmounting "/mnt/oem2524974741" Nov 1 00:14:20.255586 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Nov 1 00:14:20.255586 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Nov 1 00:14:20.255586 ignition[1332]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:20.255586 ignition[1332]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem506487167" Nov 1 00:14:20.255586 ignition[1332]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem506487167": device or resource busy Nov 1 00:14:20.255586 ignition[1332]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem506487167", trying btrfs: device or resource busy Nov 1 00:14:20.255586 ignition[1332]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem506487167" Nov 1 00:14:20.255586 ignition[1332]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem506487167" Nov 1 00:14:20.255586 ignition[1332]: INFO : op(9): [started] unmounting "/mnt/oem506487167" Nov 1 00:14:20.255586 ignition[1332]: INFO : op(9): [finished] unmounting "/mnt/oem506487167" Nov 1 00:14:20.255586 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Nov 1 00:14:20.255586 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:14:20.255586 ignition[1332]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:20.321922 ignition[1332]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3471174832" Nov 1 00:14:20.321922 ignition[1332]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3471174832": device or resource busy Nov 1 00:14:20.321922 ignition[1332]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3471174832", trying btrfs: device or resource busy Nov 1 00:14:20.321922 ignition[1332]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3471174832" Nov 1 00:14:20.321922 ignition[1332]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3471174832" Nov 1 00:14:20.321922 ignition[1332]: INFO : op(c): [started] unmounting "/mnt/oem3471174832" Nov 1 00:14:20.321922 ignition[1332]: INFO : op(c): [finished] unmounting "/mnt/oem3471174832" Nov 1 00:14:20.321922 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:14:20.321922 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:14:20.321922 ignition[1332]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 Nov 1 00:14:21.626235 ignition[1332]: INFO : GET result: OK Nov 1 00:14:22.170713 ignition[1332]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(e): [started] processing unit "nvidia.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(e): [finished] processing unit "nvidia.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Nov 1 00:14:22.175266 ignition[1332]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Nov 1 00:14:22.223412 ignition[1332]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:14:22.223412 ignition[1332]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:14:22.223412 ignition[1332]: INFO : files: files passed Nov 1 00:14:22.223412 ignition[1332]: INFO : Ignition finished successfully Nov 1 00:14:22.236338 systemd[1]: Finished ignition-files.service. Nov 1 00:14:22.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.249521 kernel: audit: type=1130 audit(1761956062.240:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.251901 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:14:22.254672 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:14:22.256172 systemd[1]: Starting ignition-quench.service... Nov 1 00:14:22.281076 kernel: audit: type=1130 audit(1761956062.270:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.265236 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:14:22.265452 systemd[1]: Finished ignition-quench.service. Nov 1 00:14:22.290452 initrd-setup-root-after-ignition[1357]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:14:22.295581 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:14:22.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.299961 systemd[1]: Reached target ignition-complete.target. Nov 1 00:14:22.303831 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:14:22.335114 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:14:22.337468 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:14:22.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.341625 systemd[1]: Reached target initrd-fs.target. Nov 1 00:14:22.345586 systemd[1]: Reached target initrd.target. Nov 1 00:14:22.349198 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:14:22.351104 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:14:22.374529 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:14:22.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.382004 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:14:22.403021 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:14:22.406713 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:14:22.410715 systemd[1]: Stopped target timers.target. Nov 1 00:14:22.414206 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:14:22.416511 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:14:22.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.420275 systemd[1]: Stopped target initrd.target. Nov 1 00:14:22.423707 systemd[1]: Stopped target basic.target. Nov 1 00:14:22.429333 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:14:22.433386 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:14:22.437506 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:14:22.441594 systemd[1]: Stopped target remote-fs.target. Nov 1 00:14:22.445171 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:14:22.449078 systemd[1]: Stopped target sysinit.target. Nov 1 00:14:22.452585 systemd[1]: Stopped target local-fs.target. Nov 1 00:14:22.456137 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:14:22.459878 systemd[1]: Stopped target swap.target. Nov 1 00:14:22.463245 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:14:22.465499 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:14:22.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.469563 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:14:22.473198 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:14:22.475433 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:14:22.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.479282 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:14:22.482016 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:14:22.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.486539 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:14:22.486790 systemd[1]: Stopped ignition-files.service. Nov 1 00:14:22.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.494149 systemd[1]: Stopping ignition-mount.service... Nov 1 00:14:22.501967 iscsid[1181]: iscsid shutting down. Nov 1 00:14:22.507806 systemd[1]: Stopping iscsid.service... Nov 1 00:14:22.510842 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:14:22.516521 ignition[1370]: INFO : Ignition 2.14.0 Nov 1 00:14:22.516569 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:14:22.522252 ignition[1370]: INFO : Stage: umount Nov 1 00:14:22.523873 ignition[1370]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:22.523873 ignition[1370]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:22.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.533652 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:14:22.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.536849 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:14:22.537377 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:14:22.541815 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:14:22.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.544420 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:14:22.562262 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:14:22.564386 systemd[1]: Stopped iscsid.service. Nov 1 00:14:22.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.571240 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:14:22.576133 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:14:22.581244 ignition[1370]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:22.581244 ignition[1370]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:22.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.587523 ignition[1370]: INFO : PUT result: OK Nov 1 00:14:22.593364 ignition[1370]: INFO : umount: umount passed Nov 1 00:14:22.595329 ignition[1370]: INFO : Ignition finished successfully Nov 1 00:14:22.600449 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:14:22.601765 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:14:22.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.602030 systemd[1]: Stopped ignition-mount.service. Nov 1 00:14:22.607080 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:14:22.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.607342 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:14:22.611259 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:14:22.611414 systemd[1]: Stopped ignition-disks.service. Nov 1 00:14:22.613450 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:14:22.613600 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:14:22.615682 systemd[1]: ignition-fetch.service: Deactivated successfully. Nov 1 00:14:22.615788 systemd[1]: Stopped ignition-fetch.service. Nov 1 00:14:22.622121 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:14:22.622234 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:14:22.625785 systemd[1]: Stopped target paths.target. Nov 1 00:14:22.627571 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:14:22.637655 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:14:22.656098 systemd[1]: Stopped target slices.target. Nov 1 00:14:22.657960 systemd[1]: Stopped target sockets.target. Nov 1 00:14:22.659932 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:14:22.660021 systemd[1]: Closed iscsid.socket. Nov 1 00:14:22.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.664779 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:14:22.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.664904 systemd[1]: Stopped ignition-setup.service. Nov 1 00:14:22.671530 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:14:22.671791 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:14:22.675328 systemd[1]: Stopping iscsiuio.service... Nov 1 00:14:22.693030 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:14:22.695326 systemd[1]: Stopped iscsiuio.service. Nov 1 00:14:22.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.699345 systemd[1]: Stopped target network.target. Nov 1 00:14:22.701184 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:14:22.701273 systemd[1]: Closed iscsiuio.socket. Nov 1 00:14:22.702201 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:14:22.706598 systemd-networkd[1176]: eth0: DHCPv6 lease lost Nov 1 00:14:22.714605 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:14:22.718702 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:14:22.722960 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:14:22.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.727111 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:14:22.729589 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:14:22.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.732000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:14:22.732000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:14:22.733948 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:14:22.734040 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:14:22.743601 systemd[1]: Stopping network-cleanup.service... Nov 1 00:14:22.751567 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:14:22.751727 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:14:22.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.756582 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:14:22.756680 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:14:22.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.759553 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:14:22.760073 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:14:22.763985 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:14:22.771125 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:14:22.790214 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:14:22.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.790436 systemd[1]: Stopped network-cleanup.service. Nov 1 00:14:22.800410 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:14:22.800775 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:14:22.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.805978 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:14:22.806064 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:14:22.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.808184 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:14:22.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.808259 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:14:22.810150 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:14:22.810522 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:14:22.814227 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:14:22.814312 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:14:22.818044 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:14:22.818127 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:14:22.823170 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:14:22.832287 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:14:22.832406 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:14:22.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.854097 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:14:22.855462 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:14:22.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:22.860561 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:14:22.865591 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:14:22.881300 systemd[1]: Switching root. Nov 1 00:14:22.911680 systemd-journald[309]: Journal stopped Nov 1 00:14:27.512610 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Nov 1 00:14:27.512736 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:14:27.512783 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:14:27.512815 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:14:27.512845 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:14:27.512876 kernel: SELinux: policy capability open_perms=1 Nov 1 00:14:27.512906 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:14:27.512937 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:14:27.512967 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:14:27.512994 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:14:27.513035 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:14:27.513064 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:14:27.515235 systemd[1]: Successfully loaded SELinux policy in 71.200ms. Nov 1 00:14:27.515290 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.693ms. Nov 1 00:14:27.515327 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:14:27.515360 systemd[1]: Detected virtualization amazon. Nov 1 00:14:27.515416 systemd[1]: Detected architecture arm64. Nov 1 00:14:27.515449 systemd[1]: Detected first boot. Nov 1 00:14:27.515551 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:14:27.515590 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:14:27.515632 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:14:27.515667 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:14:27.515700 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:14:27.515736 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:14:27.515770 kernel: kauditd_printk_skb: 56 callbacks suppressed Nov 1 00:14:27.515800 kernel: audit: type=1334 audit(1761956067.035:85): prog-id=12 op=LOAD Nov 1 00:14:27.515833 kernel: audit: type=1334 audit(1761956067.035:86): prog-id=3 op=UNLOAD Nov 1 00:14:27.515863 kernel: audit: type=1334 audit(1761956067.037:87): prog-id=13 op=LOAD Nov 1 00:14:27.515893 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:14:27.515923 kernel: audit: type=1334 audit(1761956067.040:88): prog-id=14 op=LOAD Nov 1 00:14:27.515954 kernel: audit: type=1334 audit(1761956067.040:89): prog-id=4 op=UNLOAD Nov 1 00:14:27.515984 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:14:27.516013 kernel: audit: type=1334 audit(1761956067.040:90): prog-id=5 op=UNLOAD Nov 1 00:14:27.516047 kernel: audit: type=1131 audit(1761956067.043:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.516077 kernel: audit: type=1334 audit(1761956067.054:92): prog-id=12 op=UNLOAD Nov 1 00:14:27.516107 kernel: audit: type=1130 audit(1761956067.070:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.516138 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:14:27.516169 kernel: audit: type=1131 audit(1761956067.070:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.516198 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:14:27.516232 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:14:27.516266 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Nov 1 00:14:27.516300 systemd[1]: Created slice system-getty.slice. Nov 1 00:14:27.516329 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:14:27.516361 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:14:27.516390 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:14:27.516420 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:14:27.516453 systemd[1]: Created slice user.slice. Nov 1 00:14:27.516503 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:14:27.516539 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:14:27.516571 systemd[1]: Set up automount boot.automount. Nov 1 00:14:27.516603 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:14:27.516634 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:14:27.516665 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:14:27.516712 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:14:27.516744 systemd[1]: Reached target integritysetup.target. Nov 1 00:14:27.516774 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:14:27.516805 systemd[1]: Reached target remote-fs.target. Nov 1 00:14:27.516838 systemd[1]: Reached target slices.target. Nov 1 00:14:27.516872 systemd[1]: Reached target swap.target. Nov 1 00:14:27.516902 systemd[1]: Reached target torcx.target. Nov 1 00:14:27.516932 systemd[1]: Reached target veritysetup.target. Nov 1 00:14:27.516965 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:14:27.517000 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:14:27.517029 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:14:27.517059 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:14:27.517090 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:14:27.517120 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:14:27.517155 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:14:27.517184 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:14:27.517214 systemd[1]: Mounting media.mount... Nov 1 00:14:27.517243 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:14:27.517274 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:14:27.517303 systemd[1]: Mounting tmp.mount... Nov 1 00:14:27.517332 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:14:27.517364 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:27.517394 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:14:27.517429 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:14:27.517458 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:27.517506 systemd[1]: Starting modprobe@drm.service... Nov 1 00:14:27.517537 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:14:27.517567 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:14:27.517597 systemd[1]: Starting modprobe@loop.service... Nov 1 00:14:27.517631 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:14:27.517663 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:14:27.517692 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:14:27.517725 kernel: fuse: init (API version 7.34) Nov 1 00:14:27.517754 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:14:27.517783 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:14:27.517812 systemd[1]: Stopped systemd-journald.service. Nov 1 00:14:27.517840 kernel: loop: module loaded Nov 1 00:14:27.517868 systemd[1]: Starting systemd-journald.service... Nov 1 00:14:27.517898 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:14:27.517927 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:14:27.517958 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:14:27.517991 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:14:27.518023 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:14:27.518052 systemd[1]: Stopped verity-setup.service. Nov 1 00:14:27.518090 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:14:27.518119 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:14:27.518151 systemd[1]: Mounted media.mount. Nov 1 00:14:27.518180 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:14:27.518211 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:14:27.518244 systemd[1]: Mounted tmp.mount. Nov 1 00:14:27.518278 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:14:27.518312 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:14:27.518342 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:14:27.523329 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:27.523389 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:27.523426 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:14:27.523466 systemd[1]: Finished modprobe@drm.service. Nov 1 00:14:27.524134 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:14:27.524171 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:14:27.524202 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:14:27.524234 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:14:27.524264 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:14:27.524296 systemd[1]: Finished modprobe@loop.service. Nov 1 00:14:27.524329 systemd-journald[1489]: Journal started Nov 1 00:14:27.524442 systemd-journald[1489]: Runtime Journal (/run/log/journal/ec2a442fdc43277d2cea5c2341fa100d) is 8.0M, max 75.4M, 67.4M free. Nov 1 00:14:23.266000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:14:23.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:14:23.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:14:23.395000 audit: BPF prog-id=10 op=LOAD Nov 1 00:14:27.529196 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:14:23.395000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:14:23.395000 audit: BPF prog-id=11 op=LOAD Nov 1 00:14:23.395000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:14:23.526000 audit[1403]: AVC avc: denied { associate } for pid=1403 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:14:23.526000 audit[1403]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1386 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:23.526000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:14:23.531000 audit[1403]: AVC avc: denied { associate } for pid=1403 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:14:23.531000 audit[1403]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1386 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:23.531000 audit: CWD cwd="/" Nov 1 00:14:23.531000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:14:23.531000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:14:23.531000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:14:27.035000 audit: BPF prog-id=12 op=LOAD Nov 1 00:14:27.035000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:14:27.037000 audit: BPF prog-id=13 op=LOAD Nov 1 00:14:27.040000 audit: BPF prog-id=14 op=LOAD Nov 1 00:14:27.040000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:14:27.040000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:14:27.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.054000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:14:27.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.385000 audit: BPF prog-id=15 op=LOAD Nov 1 00:14:27.386000 audit: BPF prog-id=16 op=LOAD Nov 1 00:14:27.386000 audit: BPF prog-id=17 op=LOAD Nov 1 00:14:27.386000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:14:27.386000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:14:27.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.501000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:14:27.501000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=fffff11a0aa0 a2=4000 a3=1 items=0 ppid=1 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:27.552724 systemd[1]: Started systemd-journald.service. Nov 1 00:14:27.501000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:14:27.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:23.522771 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:14:27.032956 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:14:23.523908 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:14:27.032978 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Nov 1 00:14:23.523960 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:14:27.043842 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:14:23.524033 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:14:27.534279 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:14:23.524060 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:14:27.537060 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:14:23.524134 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:14:27.539689 systemd[1]: Reached target network-pre.target. Nov 1 00:14:23.524166 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:14:27.543788 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:14:23.524671 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:14:27.547994 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:14:23.524779 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:14:27.554708 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:14:23.524817 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:14:27.558343 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:14:23.526108 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:14:27.565245 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:14:23.526189 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:14:27.567260 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:14:23.526235 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:14:27.571169 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:14:23.526275 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:14:27.573156 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:14:23.526323 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:14:27.575697 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:14:23.526361 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:14:27.580151 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:14:26.258217 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:27.582831 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:14:26.258764 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:26.259009 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:26.259511 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:27.607672 systemd-journald[1489]: Time spent on flushing to /var/log/journal/ec2a442fdc43277d2cea5c2341fa100d is 52.342ms for 1103 entries. Nov 1 00:14:27.607672 systemd-journald[1489]: System Journal (/var/log/journal/ec2a442fdc43277d2cea5c2341fa100d) is 8.0M, max 195.6M, 187.6M free. Nov 1 00:14:27.692232 systemd-journald[1489]: Received client request to flush runtime journal. Nov 1 00:14:27.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:26.259620 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:14:27.632175 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:14:26.259755 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-11-01T00:14:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:14:27.634793 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:14:27.636886 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:14:27.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.659797 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:14:27.664008 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:14:27.695882 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:14:27.736173 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:14:27.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.745579 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:14:27.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:27.749879 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:14:27.765972 udevadm[1521]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Nov 1 00:14:28.451539 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:14:28.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:28.455000 audit: BPF prog-id=18 op=LOAD Nov 1 00:14:28.455000 audit: BPF prog-id=19 op=LOAD Nov 1 00:14:28.455000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:14:28.455000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:14:28.458115 systemd[1]: Starting systemd-udevd.service... Nov 1 00:14:28.494922 systemd-udevd[1522]: Using default interface naming scheme 'v252'. Nov 1 00:14:28.537117 systemd[1]: Started systemd-udevd.service. Nov 1 00:14:28.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:28.539000 audit: BPF prog-id=20 op=LOAD Nov 1 00:14:28.542155 systemd[1]: Starting systemd-networkd.service... Nov 1 00:14:28.558000 audit: BPF prog-id=21 op=LOAD Nov 1 00:14:28.558000 audit: BPF prog-id=22 op=LOAD Nov 1 00:14:28.558000 audit: BPF prog-id=23 op=LOAD Nov 1 00:14:28.561288 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:14:28.629268 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Nov 1 00:14:28.654242 systemd[1]: Started systemd-userdbd.service. Nov 1 00:14:28.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:28.686017 (udev-worker)[1534]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:14:28.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:28.840215 systemd-networkd[1528]: lo: Link UP Nov 1 00:14:28.840231 systemd-networkd[1528]: lo: Gained carrier Nov 1 00:14:28.841189 systemd-networkd[1528]: Enumeration completed Nov 1 00:14:28.841352 systemd[1]: Started systemd-networkd.service. Nov 1 00:14:28.845549 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:14:28.849914 systemd-networkd[1528]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:14:28.857507 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:14:28.857708 systemd-networkd[1528]: eth0: Link UP Nov 1 00:14:28.858181 systemd-networkd[1528]: eth0: Gained carrier Nov 1 00:14:28.875765 systemd-networkd[1528]: eth0: DHCPv4 address 172.31.24.1/20, gateway 172.31.16.1 acquired from 172.31.16.1 Nov 1 00:14:29.011999 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:14:29.014780 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:14:29.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.018937 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:14:29.047572 lvm[1641]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:14:29.085128 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:14:29.087499 systemd[1]: Reached target cryptsetup.target. Nov 1 00:14:29.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.091672 systemd[1]: Starting lvm2-activation.service... Nov 1 00:14:29.099862 lvm[1642]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:14:29.136008 systemd[1]: Finished lvm2-activation.service. Nov 1 00:14:29.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.138323 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:14:29.140378 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:14:29.140441 systemd[1]: Reached target local-fs.target. Nov 1 00:14:29.142703 systemd[1]: Reached target machines.target. Nov 1 00:14:29.149777 systemd[1]: Starting ldconfig.service... Nov 1 00:14:29.153016 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:29.153128 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:29.155720 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:14:29.161191 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:14:29.172343 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:14:29.182087 systemd[1]: Starting systemd-sysext.service... Nov 1 00:14:29.186119 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1644 (bootctl) Nov 1 00:14:29.188659 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:14:29.219619 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 00:14:29.233784 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 00:14:29.234193 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 00:14:29.258564 kernel: loop0: detected capacity change from 0 to 207008 Nov 1 00:14:29.260670 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:14:29.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.325116 systemd-fsck[1655]: fsck.fat 4.2 (2021-01-31) Nov 1 00:14:29.325116 systemd-fsck[1655]: /dev/nvme0n1p1: 236 files, 117310/258078 clusters Nov 1 00:14:29.329585 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:14:29.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.334643 systemd[1]: Mounting boot.mount... Nov 1 00:14:29.358832 systemd[1]: Mounted boot.mount. Nov 1 00:14:29.394282 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:14:29.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.411723 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 00:14:29.442626 kernel: loop1: detected capacity change from 0 to 207008 Nov 1 00:14:29.462852 (sd-sysext)[1670]: Using extensions 'kubernetes'. Nov 1 00:14:29.464538 (sd-sysext)[1670]: Merged extensions into '/usr'. Nov 1 00:14:29.508500 systemd[1]: Mounting usr-share-oem.mount... Nov 1 00:14:29.510727 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:29.517052 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:29.521684 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:14:29.526851 systemd[1]: Starting modprobe@loop.service... Nov 1 00:14:29.529913 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:29.530463 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:29.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.536347 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:29.536822 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:29.540577 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:14:29.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.540972 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:14:29.545034 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:14:29.545600 systemd[1]: Finished modprobe@loop.service. Nov 1 00:14:29.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.548816 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:14:29.549101 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:14:29.562692 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:14:29.565111 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:14:29.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.568517 systemd[1]: Mounted usr-share-oem.mount. Nov 1 00:14:29.572940 systemd[1]: Finished systemd-sysext.service. Nov 1 00:14:29.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:29.583604 systemd[1]: Starting ensure-sysext.service... Nov 1 00:14:29.588357 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:14:29.607027 systemd[1]: Reloading. Nov 1 00:14:29.647392 systemd-tmpfiles[1677]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:14:29.661005 systemd-tmpfiles[1677]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:14:29.676654 systemd-tmpfiles[1677]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:14:29.765770 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2025-11-01T00:14:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:14:29.777572 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2025-11-01T00:14:29Z" level=info msg="torcx already run" Nov 1 00:14:30.027579 ldconfig[1643]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:14:30.051599 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:14:30.051640 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:14:30.097185 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:14:30.202645 systemd-networkd[1528]: eth0: Gained IPv6LL Nov 1 00:14:30.253000 audit: BPF prog-id=24 op=LOAD Nov 1 00:14:30.253000 audit: BPF prog-id=20 op=UNLOAD Nov 1 00:14:30.258000 audit: BPF prog-id=25 op=LOAD Nov 1 00:14:30.258000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:14:30.258000 audit: BPF prog-id=26 op=LOAD Nov 1 00:14:30.258000 audit: BPF prog-id=27 op=LOAD Nov 1 00:14:30.258000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:14:30.258000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:14:30.260000 audit: BPF prog-id=28 op=LOAD Nov 1 00:14:30.260000 audit: BPF prog-id=21 op=UNLOAD Nov 1 00:14:30.260000 audit: BPF prog-id=29 op=LOAD Nov 1 00:14:30.260000 audit: BPF prog-id=30 op=LOAD Nov 1 00:14:30.260000 audit: BPF prog-id=22 op=UNLOAD Nov 1 00:14:30.260000 audit: BPF prog-id=23 op=UNLOAD Nov 1 00:14:30.262000 audit: BPF prog-id=31 op=LOAD Nov 1 00:14:30.262000 audit: BPF prog-id=32 op=LOAD Nov 1 00:14:30.262000 audit: BPF prog-id=18 op=UNLOAD Nov 1 00:14:30.262000 audit: BPF prog-id=19 op=UNLOAD Nov 1 00:14:30.275572 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:14:30.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.278731 systemd[1]: Finished ldconfig.service. Nov 1 00:14:30.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.282921 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:14:30.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.295757 systemd[1]: Starting audit-rules.service... Nov 1 00:14:30.300080 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:14:30.306237 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:14:30.311000 audit: BPF prog-id=33 op=LOAD Nov 1 00:14:30.322000 audit: BPF prog-id=34 op=LOAD Nov 1 00:14:30.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.320840 systemd[1]: Starting systemd-resolved.service... Nov 1 00:14:30.326271 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:14:30.331772 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:14:30.334910 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:14:30.340911 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:14:30.352000 audit[1760]: SYSTEM_BOOT pid=1760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.348634 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.351527 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:30.358839 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:14:30.363344 systemd[1]: Starting modprobe@loop.service... Nov 1 00:14:30.365505 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.365857 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:30.366153 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:14:30.368462 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:14:30.370192 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:14:30.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.377457 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:30.380383 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:30.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.383930 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:14:30.384318 systemd[1]: Finished modprobe@loop.service. Nov 1 00:14:30.387784 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:14:30.388121 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.397281 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:14:30.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.400435 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.403008 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:30.407593 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:14:30.412314 systemd[1]: Starting modprobe@loop.service... Nov 1 00:14:30.414136 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.414464 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:30.414776 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:14:30.425990 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.429884 systemd[1]: Starting modprobe@drm.service... Nov 1 00:14:30.432146 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.432526 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:30.432863 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:14:30.435379 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:30.435753 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:30.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.442073 systemd[1]: Finished ensure-sysext.service. Nov 1 00:14:30.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.451718 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:14:30.452010 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:14:30.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.456680 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:14:30.459044 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:14:30.459348 systemd[1]: Finished modprobe@loop.service. Nov 1 00:14:30.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.462708 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:14:30.462995 systemd[1]: Finished modprobe@drm.service. Nov 1 00:14:30.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.465299 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.484226 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:14:30.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.489640 systemd[1]: Starting systemd-update-done.service... Nov 1 00:14:30.516553 systemd[1]: Finished systemd-update-done.service. Nov 1 00:14:30.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.533000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:14:30.533000 audit[1781]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd8648df0 a2=420 a3=0 items=0 ppid=1753 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:30.533000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:14:30.535543 augenrules[1781]: No rules Nov 1 00:14:30.537070 systemd[1]: Finished audit-rules.service. Nov 1 00:14:30.581762 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:14:30.583874 systemd[1]: Reached target time-set.target. Nov 1 00:14:30.601435 systemd-resolved[1757]: Positive Trust Anchors: Nov 1 00:14:30.601466 systemd-resolved[1757]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:14:30.601571 systemd-resolved[1757]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:14:30.636175 systemd-resolved[1757]: Defaulting to hostname 'linux'. Nov 1 00:14:30.639215 systemd[1]: Started systemd-resolved.service. Nov 1 00:14:30.641261 systemd[1]: Reached target network.target. Nov 1 00:14:30.643058 systemd[1]: Reached target network-online.target. Nov 1 00:14:30.644965 systemd[1]: Reached target nss-lookup.target. Nov 1 00:14:30.646828 systemd[1]: Reached target sysinit.target. Nov 1 00:14:30.648733 systemd[1]: Started motdgen.path. Nov 1 00:14:30.650330 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 00:14:30.653085 systemd[1]: Started logrotate.timer. Nov 1 00:14:30.654915 systemd[1]: Started mdadm.timer. Nov 1 00:14:30.656413 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 00:14:30.658301 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 00:14:30.658353 systemd[1]: Reached target paths.target. Nov 1 00:14:30.660649 systemd[1]: Reached target timers.target. Nov 1 00:14:30.663026 systemd[1]: Listening on dbus.socket. Nov 1 00:14:30.667192 systemd[1]: Starting docker.socket... Nov 1 00:14:30.674963 systemd[1]: Listening on sshd.socket. Nov 1 00:14:30.676965 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:30.677910 systemd[1]: Listening on docker.socket. Nov 1 00:14:30.679942 systemd[1]: Reached target sockets.target. Nov 1 00:14:30.681850 systemd[1]: Reached target basic.target. Nov 1 00:14:30.683932 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.684185 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:14:30.687794 systemd[1]: Started amazon-ssm-agent.service. Nov 1 00:14:30.693327 systemd[1]: Starting containerd.service... Nov 1 00:14:30.697383 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Nov 1 00:14:30.703644 systemd[1]: Starting dbus.service... Nov 1 00:14:30.707968 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 00:14:30.712975 systemd[1]: Starting extend-filesystems.service... Nov 1 00:14:30.715506 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 00:14:30.719327 systemd[1]: Starting kubelet.service... Nov 1 00:14:30.725038 systemd[1]: Starting motdgen.service... Nov 1 00:14:30.729654 systemd[1]: Started nvidia.service. Nov 1 00:14:30.747840 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 00:14:30.754871 systemd[1]: Starting sshd-keygen.service... Nov 1 00:14:30.771445 systemd[1]: Starting systemd-logind.service... Nov 1 00:14:30.773210 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:30.773370 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Nov 1 00:14:30.774268 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 00:14:30.775915 systemd[1]: Starting update-engine.service... Nov 1 00:14:30.841977 jq[1793]: false Nov 1 00:14:30.849870 jq[1805]: true Nov 1 00:14:30.789235 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 00:14:30.876457 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 00:14:30.876870 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 00:14:30.877571 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 00:14:30.877936 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 00:14:30.901977 jq[1810]: true Nov 1 00:14:30.983318 extend-filesystems[1794]: Found loop1 Nov 1 00:14:30.985433 extend-filesystems[1794]: Found nvme0n1 Nov 1 00:14:30.985433 extend-filesystems[1794]: Found nvme0n1p1 Nov 1 00:14:30.985433 extend-filesystems[1794]: Found nvme0n1p2 Nov 1 00:14:30.985433 extend-filesystems[1794]: Found nvme0n1p3 Nov 1 00:14:30.985433 extend-filesystems[1794]: Found usr Nov 1 00:14:30.985433 extend-filesystems[1794]: Found nvme0n1p4 Nov 1 00:14:30.985433 extend-filesystems[1794]: Found nvme0n1p6 Nov 1 00:14:31.001383 extend-filesystems[1794]: Found nvme0n1p7 Nov 1 00:14:31.001383 extend-filesystems[1794]: Found nvme0n1p9 Nov 1 00:14:31.001383 extend-filesystems[1794]: Checking size of /dev/nvme0n1p9 Nov 1 00:14:31.052281 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 00:14:31.052679 systemd[1]: Finished motdgen.service. Nov 1 00:14:31.067188 dbus-daemon[1792]: [system] SELinux support is enabled Nov 1 00:14:31.067537 systemd[1]: Started dbus.service. Nov 1 00:14:31.073169 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 00:14:31.073230 systemd[1]: Reached target system-config.target. Nov 1 00:14:31.075662 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 00:14:31.075705 systemd[1]: Reached target user-config.target. Nov 1 00:14:31.114568 dbus-daemon[1792]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1528 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Nov 1 00:14:31.138838 systemd[1]: Starting systemd-hostnamed.service... Nov 1 00:14:31.160693 extend-filesystems[1794]: Resized partition /dev/nvme0n1p9 Nov 1 00:14:31.179703 bash[1854]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:14:31.181561 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 00:14:31.187896 extend-filesystems[1855]: resize2fs 1.46.5 (30-Dec-2021) Nov 1 00:14:31.246249 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 3587067 blocks Nov 1 00:14:31.275842 update_engine[1804]: I1101 00:14:31.274763 1804 main.cc:92] Flatcar Update Engine starting Nov 1 00:14:31.284895 systemd[1]: Started update-engine.service. Nov 1 00:14:31.290093 systemd[1]: Started locksmithd.service. Nov 1 00:14:31.297228 update_engine[1804]: I1101 00:14:31.296955 1804 update_check_scheduler.cc:74] Next update check in 7m14s Nov 1 00:14:31.310404 systemd-logind[1803]: Watching system buttons on /dev/input/event0 (Power Button) Nov 1 00:14:31.310487 systemd-logind[1803]: Watching system buttons on /dev/input/event1 (Sleep Button) Nov 1 00:14:31.323502 systemd-logind[1803]: New seat seat0. Nov 1 00:14:31.335439 systemd[1]: Started systemd-logind.service. Nov 1 00:14:31.385510 env[1808]: time="2025-11-01T00:14:31.384078935Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 00:14:31.392530 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 3587067 Nov 1 00:14:31.399603 systemd[1]: nvidia.service: Deactivated successfully. Nov 1 00:14:31.411614 extend-filesystems[1855]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Nov 1 00:14:31.411614 extend-filesystems[1855]: old_desc_blocks = 1, new_desc_blocks = 2 Nov 1 00:14:31.411614 extend-filesystems[1855]: The filesystem on /dev/nvme0n1p9 is now 3587067 (4k) blocks long. Nov 1 00:14:31.434222 extend-filesystems[1794]: Resized filesystem in /dev/nvme0n1p9 Nov 1 00:14:31.420147 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 00:14:31.439893 amazon-ssm-agent[1789]: 2025/11/01 00:14:31 Failed to load instance info from vault. RegistrationKey does not exist. Nov 1 00:14:31.420543 systemd[1]: Finished extend-filesystems.service. Nov 1 00:14:31.444983 dbus-daemon[1792]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 1 00:14:31.447466 dbus-daemon[1792]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1853 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Nov 1 00:14:31.445283 systemd[1]: Started systemd-hostnamed.service. Nov 1 00:14:31.453080 systemd[1]: Starting polkit.service... Nov 1 00:14:31.486282 amazon-ssm-agent[1789]: Initializing new seelog logger Nov 1 00:14:31.492868 amazon-ssm-agent[1789]: New Seelog Logger Creation Complete Nov 1 00:14:31.492868 amazon-ssm-agent[1789]: 2025/11/01 00:14:31 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Nov 1 00:14:31.492868 amazon-ssm-agent[1789]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Nov 1 00:14:31.493320 amazon-ssm-agent[1789]: 2025/11/01 00:14:31 processing appconfig overrides Nov 1 00:14:31.515941 polkitd[1876]: Started polkitd version 121 Nov 1 00:14:31.563739 polkitd[1876]: Loading rules from directory /etc/polkit-1/rules.d Nov 1 00:14:31.563868 polkitd[1876]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 1 00:14:31.574033 env[1808]: time="2025-11-01T00:14:31.573958608Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 00:14:31.574666 polkitd[1876]: Finished loading, compiling and executing 2 rules Nov 1 00:14:31.576502 dbus-daemon[1792]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Nov 1 00:14:31.576792 systemd[1]: Started polkit.service. Nov 1 00:14:31.580194 polkitd[1876]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Nov 1 00:14:31.580895 env[1808]: time="2025-11-01T00:14:31.580841268Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:31.585597 env[1808]: time="2025-11-01T00:14:31.585526896Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:14:31.586144 env[1808]: time="2025-11-01T00:14:31.586097892Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:31.587298 env[1808]: time="2025-11-01T00:14:31.587231340Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:14:31.587677 env[1808]: time="2025-11-01T00:14:31.587638368Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:31.588417 env[1808]: time="2025-11-01T00:14:31.588301620Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 00:14:31.588695 env[1808]: time="2025-11-01T00:14:31.588653928Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:31.589073 env[1808]: time="2025-11-01T00:14:31.589036428Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:31.589953 env[1808]: time="2025-11-01T00:14:31.589901184Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:31.591927 env[1808]: time="2025-11-01T00:14:31.591867756Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:14:31.594607 env[1808]: time="2025-11-01T00:14:31.594541260Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 00:14:31.594991 env[1808]: time="2025-11-01T00:14:31.594947880Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 00:14:31.598541 env[1808]: time="2025-11-01T00:14:31.598462536Z" level=info msg="metadata content store policy set" policy=shared Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.615208969Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.615283189Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.615319897Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.615427621Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.615593065Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.615637405Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.615670813Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.616218625Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.616274569Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.616308577Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.616339369Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.616373341Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.616675033Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 00:14:31.617022 env[1808]: time="2025-11-01T00:14:31.616890697Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 00:14:31.618538 env[1808]: time="2025-11-01T00:14:31.618461533Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 00:14:31.618733 env[1808]: time="2025-11-01T00:14:31.618700513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.618864 env[1808]: time="2025-11-01T00:14:31.618832573Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 00:14:31.619234 env[1808]: time="2025-11-01T00:14:31.619187329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.619960 env[1808]: time="2025-11-01T00:14:31.619448665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.620208 env[1808]: time="2025-11-01T00:14:31.620163637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.620366 env[1808]: time="2025-11-01T00:14:31.620334073Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.620688 env[1808]: time="2025-11-01T00:14:31.620646313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.621118 env[1808]: time="2025-11-01T00:14:31.621078829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.621293 env[1808]: time="2025-11-01T00:14:31.621256261Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.621438 env[1808]: time="2025-11-01T00:14:31.621403453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.621695 env[1808]: time="2025-11-01T00:14:31.621652141Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 00:14:31.622174 env[1808]: time="2025-11-01T00:14:31.622125469Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.622535 env[1808]: time="2025-11-01T00:14:31.622447645Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.622992 env[1808]: time="2025-11-01T00:14:31.622944889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.623164 env[1808]: time="2025-11-01T00:14:31.623129425Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 00:14:31.623318 env[1808]: time="2025-11-01T00:14:31.623278897Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 00:14:31.623560 env[1808]: time="2025-11-01T00:14:31.623511277Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 00:14:31.623735 env[1808]: time="2025-11-01T00:14:31.623700229Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 00:14:31.623969 env[1808]: time="2025-11-01T00:14:31.623933185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 00:14:31.624712 env[1808]: time="2025-11-01T00:14:31.624580045Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 00:14:31.626966 env[1808]: time="2025-11-01T00:14:31.626233921Z" level=info msg="Connect containerd service" Nov 1 00:14:31.626966 env[1808]: time="2025-11-01T00:14:31.626328337Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 00:14:31.632785 env[1808]: time="2025-11-01T00:14:31.632725825Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:14:31.633271 env[1808]: time="2025-11-01T00:14:31.633219409Z" level=info msg="Start subscribing containerd event" Nov 1 00:14:31.635642 env[1808]: time="2025-11-01T00:14:31.635587705Z" level=info msg="Start recovering state" Nov 1 00:14:31.636035 env[1808]: time="2025-11-01T00:14:31.636000457Z" level=info msg="Start event monitor" Nov 1 00:14:31.636230 systemd-resolved[1757]: System hostname changed to 'ip-172-31-24-1'. Nov 1 00:14:31.636231 systemd-hostnamed[1853]: Hostname set to (transient) Nov 1 00:14:31.637299 env[1808]: time="2025-11-01T00:14:31.637243165Z" level=info msg="Start snapshots syncer" Nov 1 00:14:31.637449 env[1808]: time="2025-11-01T00:14:31.637419445Z" level=info msg="Start cni network conf syncer for default" Nov 1 00:14:31.637589 env[1808]: time="2025-11-01T00:14:31.637561825Z" level=info msg="Start streaming server" Nov 1 00:14:31.638411 env[1808]: time="2025-11-01T00:14:31.638354413Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 00:14:31.645845 env[1808]: time="2025-11-01T00:14:31.645792913Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 00:14:31.646149 env[1808]: time="2025-11-01T00:14:31.646115161Z" level=info msg="containerd successfully booted in 0.275284s" Nov 1 00:14:31.646564 systemd[1]: Started containerd.service. Nov 1 00:14:32.042629 coreos-metadata[1791]: Nov 01 00:14:32.042 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Nov 1 00:14:32.046062 coreos-metadata[1791]: Nov 01 00:14:32.046 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Nov 1 00:14:32.048225 coreos-metadata[1791]: Nov 01 00:14:32.048 INFO Fetch successful Nov 1 00:14:32.048372 coreos-metadata[1791]: Nov 01 00:14:32.048 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Nov 1 00:14:32.049312 coreos-metadata[1791]: Nov 01 00:14:32.049 INFO Fetch successful Nov 1 00:14:32.053521 unknown[1791]: wrote ssh authorized keys file for user: core Nov 1 00:14:32.097623 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Create new startup processor Nov 1 00:14:32.098232 update-ssh-keys[1965]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:14:32.099627 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Nov 1 00:14:32.107696 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [LongRunningPluginsManager] registered plugins: {} Nov 1 00:14:32.107921 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing bookkeeping folders Nov 1 00:14:32.108037 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO removing the completed state files Nov 1 00:14:32.108148 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing bookkeeping folders for long running plugins Nov 1 00:14:32.108265 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Nov 1 00:14:32.108379 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing healthcheck folders for long running plugins Nov 1 00:14:32.108523 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing locations for inventory plugin Nov 1 00:14:32.108672 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing default location for custom inventory Nov 1 00:14:32.108798 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing default location for file inventory Nov 1 00:14:32.108914 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Initializing default location for role inventory Nov 1 00:14:32.109040 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Init the cloudwatchlogs publisher Nov 1 00:14:32.109186 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:runPowerShellScript Nov 1 00:14:32.109334 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:configureDocker Nov 1 00:14:32.109460 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:runDockerAction Nov 1 00:14:32.109686 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:configurePackage Nov 1 00:14:32.109818 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:runDocument Nov 1 00:14:32.109934 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:softwareInventory Nov 1 00:14:32.110048 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:updateSsmAgent Nov 1 00:14:32.110445 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:refreshAssociation Nov 1 00:14:32.110445 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform independent plugin aws:downloadContent Nov 1 00:14:32.110445 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Successfully loaded platform dependent plugin aws:runShellScript Nov 1 00:14:32.110445 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Nov 1 00:14:32.110445 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO OS: linux, Arch: arm64 Nov 1 00:14:32.114626 amazon-ssm-agent[1789]: datastore file /var/lib/amazon/ssm/i-0ec2471a23d2a1920/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Nov 1 00:14:32.215399 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] Starting document processing engine... Nov 1 00:14:32.310211 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] [EngineProcessor] Starting Nov 1 00:14:32.372623 locksmithd[1867]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 00:14:32.404499 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Nov 1 00:14:32.499063 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] Starting message polling Nov 1 00:14:32.593872 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] Starting send replies to MDS Nov 1 00:14:32.688737 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [instanceID=i-0ec2471a23d2a1920] Starting association polling Nov 1 00:14:32.783866 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Nov 1 00:14:32.879269 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] [Association] Launching response handler Nov 1 00:14:32.974673 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Nov 1 00:14:33.070385 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Nov 1 00:14:33.166365 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Nov 1 00:14:33.262423 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [HealthCheck] HealthCheck reporting agent health. Nov 1 00:14:33.358723 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] Starting session document processing engine... Nov 1 00:14:33.455279 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] [EngineProcessor] Starting Nov 1 00:14:33.551902 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Nov 1 00:14:33.648812 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0ec2471a23d2a1920, requestId: 1db597e0-b3f2-483c-bec8-e5e2d970f0f0 Nov 1 00:14:33.745944 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [OfflineService] Starting document processing engine... Nov 1 00:14:33.833881 systemd[1]: Started kubelet.service. Nov 1 00:14:33.843222 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [OfflineService] [EngineProcessor] Starting Nov 1 00:14:33.940728 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [OfflineService] [EngineProcessor] Initial processing Nov 1 00:14:34.038526 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [OfflineService] Starting message polling Nov 1 00:14:34.136303 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [OfflineService] Starting send replies to MDS Nov 1 00:14:34.234404 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [LongRunningPluginsManager] starting long running plugin manager Nov 1 00:14:34.332789 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] listening reply. Nov 1 00:14:34.431182 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Nov 1 00:14:34.529849 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [StartupProcessor] Executing startup processor tasks Nov 1 00:14:34.628748 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Nov 1 00:14:34.727684 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Nov 1 00:14:34.826923 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Nov 1 00:14:34.926460 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Nov 1 00:14:35.026088 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ec2471a23d2a1920?role=subscribe&stream=input Nov 1 00:14:35.042820 kubelet[1985]: E1101 00:14:35.033851 1985 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:14:35.047006 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:14:35.047314 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:14:35.047832 systemd[1]: kubelet.service: Consumed 1.618s CPU time. Nov 1 00:14:35.125949 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ec2471a23d2a1920?role=subscribe&stream=input Nov 1 00:14:35.163273 sshd_keygen[1827]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 00:14:35.201011 systemd[1]: Finished sshd-keygen.service. Nov 1 00:14:35.205716 systemd[1]: Starting issuegen.service... Nov 1 00:14:35.218077 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 00:14:35.218445 systemd[1]: Finished issuegen.service. Nov 1 00:14:35.223673 systemd[1]: Starting systemd-user-sessions.service... Nov 1 00:14:35.226425 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] Starting receiving message from control channel Nov 1 00:14:35.239334 systemd[1]: Finished systemd-user-sessions.service. Nov 1 00:14:35.244374 systemd[1]: Started getty@tty1.service. Nov 1 00:14:35.249898 systemd[1]: Started serial-getty@ttyS0.service. Nov 1 00:14:35.252451 systemd[1]: Reached target getty.target. Nov 1 00:14:35.254598 systemd[1]: Reached target multi-user.target. Nov 1 00:14:35.260515 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 00:14:35.279684 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 00:14:35.280061 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 00:14:35.282612 systemd[1]: Startup finished in 1.198s (kernel) + 8.573s (initrd) + 12.107s (userspace) = 21.879s. Nov 1 00:14:35.326453 amazon-ssm-agent[1789]: 2025-11-01 00:14:32 INFO [MessageGatewayService] [EngineProcessor] Initial processing Nov 1 00:14:39.295066 systemd[1]: Created slice system-sshd.slice. Nov 1 00:14:39.297524 systemd[1]: Started sshd@0-172.31.24.1:22-147.75.109.163:41774.service. Nov 1 00:14:39.490019 sshd[2006]: Accepted publickey for core from 147.75.109.163 port 41774 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:39.495274 sshd[2006]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:39.517257 systemd[1]: Created slice user-500.slice. Nov 1 00:14:39.520179 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 00:14:39.524521 systemd-logind[1803]: New session 1 of user core. Nov 1 00:14:39.546043 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 00:14:39.549415 systemd[1]: Starting user@500.service... Nov 1 00:14:39.558067 (systemd)[2009]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:39.748245 systemd[2009]: Queued start job for default target default.target. Nov 1 00:14:39.749296 systemd[2009]: Reached target paths.target. Nov 1 00:14:39.749349 systemd[2009]: Reached target sockets.target. Nov 1 00:14:39.749381 systemd[2009]: Reached target timers.target. Nov 1 00:14:39.749411 systemd[2009]: Reached target basic.target. Nov 1 00:14:39.749523 systemd[2009]: Reached target default.target. Nov 1 00:14:39.749590 systemd[2009]: Startup finished in 179ms. Nov 1 00:14:39.750637 systemd[1]: Started user@500.service. Nov 1 00:14:39.752767 systemd[1]: Started session-1.scope. Nov 1 00:14:39.897807 systemd[1]: Started sshd@1-172.31.24.1:22-147.75.109.163:41776.service. Nov 1 00:14:40.068900 sshd[2018]: Accepted publickey for core from 147.75.109.163 port 41776 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:40.072085 sshd[2018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:40.080069 systemd-logind[1803]: New session 2 of user core. Nov 1 00:14:40.081965 systemd[1]: Started session-2.scope. Nov 1 00:14:40.213698 sshd[2018]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:40.218247 systemd[1]: sshd@1-172.31.24.1:22-147.75.109.163:41776.service: Deactivated successfully. Nov 1 00:14:40.219582 systemd[1]: session-2.scope: Deactivated successfully. Nov 1 00:14:40.220709 systemd-logind[1803]: Session 2 logged out. Waiting for processes to exit. Nov 1 00:14:40.222666 systemd-logind[1803]: Removed session 2. Nov 1 00:14:40.243549 systemd[1]: Started sshd@2-172.31.24.1:22-147.75.109.163:41116.service. Nov 1 00:14:40.409989 sshd[2024]: Accepted publickey for core from 147.75.109.163 port 41116 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:40.412994 sshd[2024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:40.421226 systemd[1]: Started session-3.scope. Nov 1 00:14:40.422395 systemd-logind[1803]: New session 3 of user core. Nov 1 00:14:40.543562 sshd[2024]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:40.548875 systemd[1]: session-3.scope: Deactivated successfully. Nov 1 00:14:40.550004 systemd[1]: sshd@2-172.31.24.1:22-147.75.109.163:41116.service: Deactivated successfully. Nov 1 00:14:40.551604 systemd-logind[1803]: Session 3 logged out. Waiting for processes to exit. Nov 1 00:14:40.554013 systemd-logind[1803]: Removed session 3. Nov 1 00:14:40.571344 systemd[1]: Started sshd@3-172.31.24.1:22-147.75.109.163:41130.service. Nov 1 00:14:40.738836 sshd[2030]: Accepted publickey for core from 147.75.109.163 port 41130 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:40.741333 sshd[2030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:40.750080 systemd[1]: Started session-4.scope. Nov 1 00:14:40.751594 systemd-logind[1803]: New session 4 of user core. Nov 1 00:14:40.880924 sshd[2030]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:40.886545 systemd[1]: sshd@3-172.31.24.1:22-147.75.109.163:41130.service: Deactivated successfully. Nov 1 00:14:40.887799 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 00:14:40.888986 systemd-logind[1803]: Session 4 logged out. Waiting for processes to exit. Nov 1 00:14:40.891073 systemd-logind[1803]: Removed session 4. Nov 1 00:14:40.908393 systemd[1]: Started sshd@4-172.31.24.1:22-147.75.109.163:41138.service. Nov 1 00:14:41.076625 sshd[2036]: Accepted publickey for core from 147.75.109.163 port 41138 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:41.078247 sshd[2036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:41.086698 systemd-logind[1803]: New session 5 of user core. Nov 1 00:14:41.087094 systemd[1]: Started session-5.scope. Nov 1 00:14:41.211550 sudo[2039]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 00:14:41.213384 sudo[2039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:41.229789 dbus-daemon[1792]: avc: received setenforce notice (enforcing=1) Nov 1 00:14:41.232647 sudo[2039]: pam_unix(sudo:session): session closed for user root Nov 1 00:14:41.257846 sshd[2036]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:41.262770 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 00:14:41.264000 systemd-logind[1803]: Session 5 logged out. Waiting for processes to exit. Nov 1 00:14:41.264359 systemd[1]: sshd@4-172.31.24.1:22-147.75.109.163:41138.service: Deactivated successfully. Nov 1 00:14:41.266932 systemd-logind[1803]: Removed session 5. Nov 1 00:14:41.284904 systemd[1]: Started sshd@5-172.31.24.1:22-147.75.109.163:41142.service. Nov 1 00:14:41.451347 sshd[2043]: Accepted publickey for core from 147.75.109.163 port 41142 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:41.454440 sshd[2043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:41.461569 systemd-logind[1803]: New session 6 of user core. Nov 1 00:14:41.462848 systemd[1]: Started session-6.scope. Nov 1 00:14:41.569308 sudo[2047]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 00:14:41.570406 sudo[2047]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:41.575939 sudo[2047]: pam_unix(sudo:session): session closed for user root Nov 1 00:14:41.585529 sudo[2046]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 00:14:41.586100 sudo[2046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:41.603000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:14:41.605856 systemd[1]: Stopping audit-rules.service... Nov 1 00:14:41.607515 kernel: kauditd_printk_skb: 108 callbacks suppressed Nov 1 00:14:41.607607 kernel: audit: type=1305 audit(1761956081.603:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:14:41.603000 audit[2050]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc3b64d40 a2=420 a3=0 items=0 ppid=1 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:41.626532 kernel: audit: type=1300 audit(1761956081.603:199): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc3b64d40 a2=420 a3=0 items=0 ppid=1 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:41.626679 auditctl[2050]: No rules Nov 1 00:14:41.613840 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 00:14:41.603000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:14:41.631386 kernel: audit: type=1327 audit(1761956081.603:199): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:14:41.631497 kernel: audit: type=1131 audit(1761956081.611:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.614181 systemd[1]: Stopped audit-rules.service. Nov 1 00:14:41.625433 systemd[1]: Starting audit-rules.service... Nov 1 00:14:41.659911 augenrules[2067]: No rules Nov 1 00:14:41.661435 systemd[1]: Finished audit-rules.service. Nov 1 00:14:41.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.663732 sudo[2046]: pam_unix(sudo:session): session closed for user root Nov 1 00:14:41.661000 audit[2046]: USER_END pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.680241 kernel: audit: type=1130 audit(1761956081.660:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.680318 kernel: audit: type=1106 audit(1761956081.661:202): pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.680369 kernel: audit: type=1104 audit(1761956081.661:203): pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.661000 audit[2046]: CRED_DISP pid=2046 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.692829 sshd[2043]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:41.693000 audit[2043]: USER_END pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:41.698513 systemd-logind[1803]: Session 6 logged out. Waiting for processes to exit. Nov 1 00:14:41.699990 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 00:14:41.701111 systemd[1]: sshd@5-172.31.24.1:22-147.75.109.163:41142.service: Deactivated successfully. Nov 1 00:14:41.703682 systemd-logind[1803]: Removed session 6. Nov 1 00:14:41.693000 audit[2043]: CRED_DISP pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:41.719746 kernel: audit: type=1106 audit(1761956081.693:204): pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:41.719878 kernel: audit: type=1104 audit(1761956081.693:205): pid=2043 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:41.719929 kernel: audit: type=1131 audit(1761956081.699:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.24.1:22-147.75.109.163:41142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.24.1:22-147.75.109.163:41142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.1:22-147.75.109.163:41152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:41.723837 systemd[1]: Started sshd@6-172.31.24.1:22-147.75.109.163:41152.service. Nov 1 00:14:41.889000 audit[2073]: USER_ACCT pid=2073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:41.891248 sshd[2073]: Accepted publickey for core from 147.75.109.163 port 41152 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:41.891000 audit[2073]: CRED_ACQ pid=2073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:41.891000 audit[2073]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb768490 a2=3 a3=1 items=0 ppid=1 pid=2073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:41.891000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:14:41.893855 sshd[2073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:41.902849 systemd[1]: Started session-7.scope. Nov 1 00:14:41.903925 systemd-logind[1803]: New session 7 of user core. Nov 1 00:14:41.913000 audit[2073]: USER_START pid=2073 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:41.915000 audit[2075]: CRED_ACQ pid=2075 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:42.010000 audit[2076]: USER_ACCT pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.011934 sudo[2076]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 00:14:42.011000 audit[2076]: CRED_REFR pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.013310 sudo[2076]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:42.015000 audit[2076]: USER_START pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.037528 systemd[1]: Starting coreos-metadata.service... Nov 1 00:14:42.212089 coreos-metadata[2080]: Nov 01 00:14:42.211 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Nov 1 00:14:42.213190 coreos-metadata[2080]: Nov 01 00:14:42.212 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Nov 1 00:14:42.213865 coreos-metadata[2080]: Nov 01 00:14:42.213 INFO Fetch successful Nov 1 00:14:42.214133 coreos-metadata[2080]: Nov 01 00:14:42.213 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Nov 1 00:14:42.214557 coreos-metadata[2080]: Nov 01 00:14:42.214 INFO Fetch successful Nov 1 00:14:42.214819 coreos-metadata[2080]: Nov 01 00:14:42.214 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Nov 1 00:14:42.215267 coreos-metadata[2080]: Nov 01 00:14:42.215 INFO Fetch successful Nov 1 00:14:42.215586 coreos-metadata[2080]: Nov 01 00:14:42.215 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Nov 1 00:14:42.215882 coreos-metadata[2080]: Nov 01 00:14:42.215 INFO Fetch successful Nov 1 00:14:42.216149 coreos-metadata[2080]: Nov 01 00:14:42.215 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Nov 1 00:14:42.216707 coreos-metadata[2080]: Nov 01 00:14:42.216 INFO Fetch successful Nov 1 00:14:42.217027 coreos-metadata[2080]: Nov 01 00:14:42.216 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Nov 1 00:14:42.217413 coreos-metadata[2080]: Nov 01 00:14:42.217 INFO Fetch successful Nov 1 00:14:42.217718 coreos-metadata[2080]: Nov 01 00:14:42.217 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Nov 1 00:14:42.218226 coreos-metadata[2080]: Nov 01 00:14:42.218 INFO Fetch successful Nov 1 00:14:42.218553 coreos-metadata[2080]: Nov 01 00:14:42.218 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Nov 1 00:14:42.218780 coreos-metadata[2080]: Nov 01 00:14:42.218 INFO Fetch successful Nov 1 00:14:42.233258 systemd[1]: Finished coreos-metadata.service. Nov 1 00:14:42.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.351176 systemd[1]: Stopped kubelet.service. Nov 1 00:14:43.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.352158 systemd[1]: kubelet.service: Consumed 1.618s CPU time. Nov 1 00:14:43.356868 systemd[1]: Starting kubelet.service... Nov 1 00:14:43.412732 systemd[1]: Reloading. Nov 1 00:14:43.575775 /usr/lib/systemd/system-generators/torcx-generator[2137]: time="2025-11-01T00:14:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:14:43.575848 /usr/lib/systemd/system-generators/torcx-generator[2137]: time="2025-11-01T00:14:43Z" level=info msg="torcx already run" Nov 1 00:14:43.638548 amazon-ssm-agent[1789]: 2025-11-01 00:14:43 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Nov 1 00:14:43.768555 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:14:43.768596 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:14:43.808051 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.980000 audit: BPF prog-id=43 op=LOAD Nov 1 00:14:43.981000 audit: BPF prog-id=38 op=UNLOAD Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit: BPF prog-id=44 op=LOAD Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.981000 audit: BPF prog-id=45 op=LOAD Nov 1 00:14:43.981000 audit: BPF prog-id=39 op=UNLOAD Nov 1 00:14:43.981000 audit: BPF prog-id=40 op=UNLOAD Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.984000 audit: BPF prog-id=46 op=LOAD Nov 1 00:14:43.984000 audit: BPF prog-id=24 op=UNLOAD Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.988000 audit: BPF prog-id=47 op=LOAD Nov 1 00:14:43.988000 audit: BPF prog-id=34 op=UNLOAD Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit: BPF prog-id=48 op=LOAD Nov 1 00:14:43.990000 audit: BPF prog-id=25 op=UNLOAD Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit: BPF prog-id=49 op=LOAD Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.990000 audit: BPF prog-id=50 op=LOAD Nov 1 00:14:43.990000 audit: BPF prog-id=26 op=UNLOAD Nov 1 00:14:43.990000 audit: BPF prog-id=27 op=UNLOAD Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.993000 audit: BPF prog-id=51 op=LOAD Nov 1 00:14:43.993000 audit: BPF prog-id=28 op=UNLOAD Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit: BPF prog-id=52 op=LOAD Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.994000 audit: BPF prog-id=53 op=LOAD Nov 1 00:14:43.994000 audit: BPF prog-id=29 op=UNLOAD Nov 1 00:14:43.994000 audit: BPF prog-id=30 op=UNLOAD Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.998000 audit: BPF prog-id=54 op=LOAD Nov 1 00:14:43.998000 audit: BPF prog-id=33 op=UNLOAD Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit: BPF prog-id=55 op=LOAD Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:43.999000 audit: BPF prog-id=56 op=LOAD Nov 1 00:14:43.999000 audit: BPF prog-id=31 op=UNLOAD Nov 1 00:14:43.999000 audit: BPF prog-id=32 op=UNLOAD Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit: BPF prog-id=57 op=LOAD Nov 1 00:14:44.004000 audit: BPF prog-id=35 op=UNLOAD Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit: BPF prog-id=58 op=LOAD Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.005000 audit: BPF prog-id=59 op=LOAD Nov 1 00:14:44.005000 audit: BPF prog-id=36 op=UNLOAD Nov 1 00:14:44.005000 audit: BPF prog-id=37 op=UNLOAD Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:44.008000 audit: BPF prog-id=60 op=LOAD Nov 1 00:14:44.008000 audit: BPF prog-id=41 op=UNLOAD Nov 1 00:14:44.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.039066 systemd[1]: Started kubelet.service. Nov 1 00:14:44.047459 systemd[1]: Stopping kubelet.service... Nov 1 00:14:44.049265 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 00:14:44.049722 systemd[1]: Stopped kubelet.service. Nov 1 00:14:44.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.053244 systemd[1]: Starting kubelet.service... Nov 1 00:14:44.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.374083 systemd[1]: Started kubelet.service. Nov 1 00:14:44.454375 kubelet[2201]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:14:44.454966 kubelet[2201]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 00:14:44.455067 kubelet[2201]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:14:44.455389 kubelet[2201]: I1101 00:14:44.455316 2201 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 00:14:45.000956 kubelet[2201]: I1101 00:14:45.000823 2201 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Nov 1 00:14:45.001209 kubelet[2201]: I1101 00:14:45.001187 2201 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 00:14:45.002026 kubelet[2201]: I1101 00:14:45.001997 2201 server.go:954] "Client rotation is on, will bootstrap in background" Nov 1 00:14:45.094975 kubelet[2201]: I1101 00:14:45.094917 2201 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 00:14:45.108913 kubelet[2201]: E1101 00:14:45.108847 2201 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 00:14:45.108913 kubelet[2201]: I1101 00:14:45.108900 2201 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 00:14:45.115300 kubelet[2201]: I1101 00:14:45.115261 2201 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 00:14:45.116194 kubelet[2201]: I1101 00:14:45.116143 2201 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 00:14:45.116671 kubelet[2201]: I1101 00:14:45.116336 2201 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.24.1","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 00:14:45.117987 kubelet[2201]: I1101 00:14:45.117223 2201 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 00:14:45.117987 kubelet[2201]: I1101 00:14:45.117253 2201 container_manager_linux.go:304] "Creating device plugin manager" Nov 1 00:14:45.117987 kubelet[2201]: I1101 00:14:45.117597 2201 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:14:45.130932 kubelet[2201]: I1101 00:14:45.130897 2201 kubelet.go:446] "Attempting to sync node with API server" Nov 1 00:14:45.131293 kubelet[2201]: I1101 00:14:45.131268 2201 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 00:14:45.131510 kubelet[2201]: I1101 00:14:45.131460 2201 kubelet.go:352] "Adding apiserver pod source" Nov 1 00:14:45.131759 kubelet[2201]: I1101 00:14:45.131683 2201 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 00:14:45.132801 kubelet[2201]: E1101 00:14:45.132754 2201 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:45.132946 kubelet[2201]: E1101 00:14:45.132842 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:45.137500 kubelet[2201]: I1101 00:14:45.137442 2201 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 00:14:45.138568 kubelet[2201]: I1101 00:14:45.138534 2201 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Nov 1 00:14:45.138989 kubelet[2201]: W1101 00:14:45.138947 2201 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 00:14:45.140648 kubelet[2201]: I1101 00:14:45.140610 2201 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 00:14:45.140816 kubelet[2201]: I1101 00:14:45.140670 2201 server.go:1287] "Started kubelet" Nov 1 00:14:45.151686 kubelet[2201]: I1101 00:14:45.151602 2201 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 00:14:45.153532 kubelet[2201]: I1101 00:14:45.153497 2201 server.go:479] "Adding debug handlers to kubelet server" Nov 1 00:14:45.154033 kubelet[2201]: I1101 00:14:45.153936 2201 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 00:14:45.154587 kubelet[2201]: I1101 00:14:45.154539 2201 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 00:14:45.160708 kubelet[2201]: E1101 00:14:45.160653 2201 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Nov 1 00:14:45.160000 audit[2201]: AVC avc: denied { mac_admin } for pid=2201 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:45.160000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:14:45.160000 audit[2201]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009a1770 a1=4000a62480 a2=40009a1740 a3=25 items=0 ppid=1 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:14:45.162175 kubelet[2201]: I1101 00:14:45.162125 2201 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 00:14:45.160000 audit[2201]: AVC avc: denied { mac_admin } for pid=2201 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:45.160000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:14:45.160000 audit[2201]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a40400 a1=4000a62498 a2=40009a1800 a3=25 items=0 ppid=1 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:14:45.162729 kubelet[2201]: I1101 00:14:45.162697 2201 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 00:14:45.164559 kubelet[2201]: I1101 00:14:45.163001 2201 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 00:14:45.167380 kubelet[2201]: I1101 00:14:45.163260 2201 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 00:14:45.167796 kubelet[2201]: I1101 00:14:45.167772 2201 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 00:14:45.168670 kubelet[2201]: I1101 00:14:45.168539 2201 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 00:14:45.168995 kubelet[2201]: I1101 00:14:45.168888 2201 reconciler.go:26] "Reconciler: start to sync state" Nov 1 00:14:45.170662 kubelet[2201]: E1101 00:14:45.170615 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:45.171212 kubelet[2201]: I1101 00:14:45.171174 2201 factory.go:221] Registration of the systemd container factory successfully Nov 1 00:14:45.171595 kubelet[2201]: I1101 00:14:45.171560 2201 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 00:14:45.174246 kubelet[2201]: I1101 00:14:45.174210 2201 factory.go:221] Registration of the containerd container factory successfully Nov 1 00:14:45.200246 kubelet[2201]: E1101 00:14:45.199792 2201 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.1.1873b9b964a554fc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.1,UID:172.31.24.1,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.24.1,},FirstTimestamp:2025-11-01 00:14:45.14064102 +0000 UTC m=+0.760285529,LastTimestamp:2025-11-01 00:14:45.14064102 +0000 UTC m=+0.760285529,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.1,}" Nov 1 00:14:45.202199 kubelet[2201]: W1101 00:14:45.201174 2201 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Nov 1 00:14:45.202378 kubelet[2201]: E1101 00:14:45.202240 2201 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Nov 1 00:14:45.202378 kubelet[2201]: W1101 00:14:45.201562 2201 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.24.1" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Nov 1 00:14:45.202378 kubelet[2201]: E1101 00:14:45.202315 2201 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.24.1\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Nov 1 00:14:45.215710 kubelet[2201]: E1101 00:14:45.215641 2201 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.24.1\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Nov 1 00:14:45.220763 kubelet[2201]: W1101 00:14:45.220685 2201 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Nov 1 00:14:45.220974 kubelet[2201]: E1101 00:14:45.220778 2201 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Nov 1 00:14:45.228000 audit[2219]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.228000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc0cb4590 a2=0 a3=1 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:14:45.231000 audit[2222]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.231000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffede51a90 a2=0 a3=1 items=0 ppid=2201 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:14:45.233611 kubelet[2201]: E1101 00:14:45.233410 2201 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.1.1873b9b965d64e70 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.1,UID:172.31.24.1,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.24.1,},FirstTimestamp:2025-11-01 00:14:45.160627824 +0000 UTC m=+0.780272345,LastTimestamp:2025-11-01 00:14:45.160627824 +0000 UTC m=+0.780272345,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.1,}" Nov 1 00:14:45.237416 kubelet[2201]: I1101 00:14:45.237362 2201 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 00:14:45.237416 kubelet[2201]: I1101 00:14:45.237398 2201 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 00:14:45.237843 kubelet[2201]: I1101 00:14:45.237433 2201 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:14:45.245752 kubelet[2201]: I1101 00:14:45.245693 2201 policy_none.go:49] "None policy: Start" Nov 1 00:14:45.245752 kubelet[2201]: I1101 00:14:45.245740 2201 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 00:14:45.245973 kubelet[2201]: I1101 00:14:45.245766 2201 state_mem.go:35] "Initializing new in-memory state store" Nov 1 00:14:45.260670 systemd[1]: Created slice kubepods.slice. Nov 1 00:14:45.239000 audit[2224]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.239000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe500e210 a2=0 a3=1 items=0 ppid=2201 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:14:45.274911 kubelet[2201]: E1101 00:14:45.273452 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:45.273959 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 00:14:45.283448 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 00:14:45.285000 audit[2229]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.285000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd54b4a0 a2=0 a3=1 items=0 ppid=2201 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:14:45.289557 kubelet[2201]: I1101 00:14:45.289514 2201 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Nov 1 00:14:45.288000 audit[2201]: AVC avc: denied { mac_admin } for pid=2201 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:45.288000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:14:45.288000 audit[2201]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000adee40 a1=4000a639c8 a2=4000adee10 a3=25 items=0 ppid=1 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.288000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:14:45.290069 kubelet[2201]: I1101 00:14:45.289624 2201 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Nov 1 00:14:45.290069 kubelet[2201]: I1101 00:14:45.289816 2201 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 00:14:45.290069 kubelet[2201]: I1101 00:14:45.289843 2201 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 00:14:45.292596 kubelet[2201]: I1101 00:14:45.292543 2201 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 00:14:45.295779 kubelet[2201]: E1101 00:14:45.295740 2201 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 00:14:45.296028 kubelet[2201]: E1101 00:14:45.295989 2201 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.24.1\" not found" Nov 1 00:14:45.359000 audit[2234]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.359000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff6531580 a2=0 a3=1 items=0 ppid=2201 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Nov 1 00:14:45.361317 kubelet[2201]: I1101 00:14:45.361243 2201 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Nov 1 00:14:45.362000 audit[2236]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:45.362000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe5a43770 a2=0 a3=1 items=0 ppid=2201 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:14:45.362000 audit[2235]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.362000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4cc3b80 a2=0 a3=1 items=0 ppid=2201 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:14:45.364811 kubelet[2201]: I1101 00:14:45.364759 2201 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Nov 1 00:14:45.365006 kubelet[2201]: I1101 00:14:45.364985 2201 status_manager.go:227] "Starting to sync pod status with apiserver" Nov 1 00:14:45.365180 kubelet[2201]: I1101 00:14:45.365157 2201 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 00:14:45.365311 kubelet[2201]: I1101 00:14:45.365291 2201 kubelet.go:2382] "Starting kubelet main sync loop" Nov 1 00:14:45.365648 kubelet[2201]: E1101 00:14:45.365620 2201 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Nov 1 00:14:45.364000 audit[2237]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.364000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe7283050 a2=0 a3=1 items=0 ppid=2201 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:14:45.367000 audit[2238]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:45.367000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe61b1af0 a2=0 a3=1 items=0 ppid=2201 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:14:45.368000 audit[2239]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:45.368000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff1d2f580 a2=0 a3=1 items=0 ppid=2201 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:14:45.370000 audit[2240]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:45.370000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffefcb6010 a2=0 a3=1 items=0 ppid=2201 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:14:45.373000 audit[2241]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:45.373000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc003b9c0 a2=0 a3=1 items=0 ppid=2201 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:14:45.392030 kubelet[2201]: I1101 00:14:45.391961 2201 kubelet_node_status.go:75] "Attempting to register node" node="172.31.24.1" Nov 1 00:14:45.415604 kubelet[2201]: I1101 00:14:45.415545 2201 kubelet_node_status.go:78] "Successfully registered node" node="172.31.24.1" Nov 1 00:14:45.415604 kubelet[2201]: E1101 00:14:45.415609 2201 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"172.31.24.1\": node \"172.31.24.1\" not found" Nov 1 00:14:45.514000 audit[2076]: USER_END pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.514000 audit[2076]: CRED_DISP pid=2076 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.515499 sudo[2076]: pam_unix(sudo:session): session closed for user root Nov 1 00:14:45.516858 kubelet[2201]: E1101 00:14:45.516803 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:45.539400 sshd[2073]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:45.540000 audit[2073]: USER_END pid=2073 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:45.540000 audit[2073]: CRED_DISP pid=2073 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:45.544458 systemd-logind[1803]: Session 7 logged out. Waiting for processes to exit. Nov 1 00:14:45.544762 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 00:14:45.546729 systemd[1]: sshd@6-172.31.24.1:22-147.75.109.163:41152.service: Deactivated successfully. Nov 1 00:14:45.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.1:22-147.75.109.163:41152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.548260 systemd-logind[1803]: Removed session 7. Nov 1 00:14:45.618252 kubelet[2201]: E1101 00:14:45.618187 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:45.719317 kubelet[2201]: E1101 00:14:45.719276 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:45.820201 kubelet[2201]: E1101 00:14:45.820070 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:45.920934 kubelet[2201]: E1101 00:14:45.920895 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:46.005801 kubelet[2201]: I1101 00:14:46.005734 2201 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Nov 1 00:14:46.006085 kubelet[2201]: W1101 00:14:46.006040 2201 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Nov 1 00:14:46.021940 kubelet[2201]: E1101 00:14:46.021913 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:46.123052 kubelet[2201]: E1101 00:14:46.122917 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:46.133162 kubelet[2201]: E1101 00:14:46.133129 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:46.223592 kubelet[2201]: E1101 00:14:46.223531 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:46.323839 kubelet[2201]: E1101 00:14:46.323797 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:46.424802 kubelet[2201]: E1101 00:14:46.424448 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:46.525673 kubelet[2201]: E1101 00:14:46.525626 2201 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.24.1\" not found" Nov 1 00:14:46.627723 kubelet[2201]: I1101 00:14:46.627682 2201 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Nov 1 00:14:46.628348 env[1808]: time="2025-11-01T00:14:46.628194171Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 00:14:46.628933 kubelet[2201]: I1101 00:14:46.628589 2201 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Nov 1 00:14:47.133443 kubelet[2201]: I1101 00:14:47.133379 2201 apiserver.go:52] "Watching apiserver" Nov 1 00:14:47.133774 kubelet[2201]: E1101 00:14:47.133706 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:47.146262 kubelet[2201]: E1101 00:14:47.146195 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:14:47.156394 systemd[1]: Created slice kubepods-besteffort-poddd520fdf_274f_42b4_b3aa_e252a5875694.slice. Nov 1 00:14:47.169774 kubelet[2201]: I1101 00:14:47.169711 2201 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 00:14:47.179441 systemd[1]: Created slice kubepods-besteffort-pod211b7e18_eb6d_43a0_93f7_75f18a1459e2.slice. Nov 1 00:14:47.185397 kubelet[2201]: I1101 00:14:47.185341 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/211b7e18-eb6d-43a0-93f7-75f18a1459e2-kube-proxy\") pod \"kube-proxy-tf6mz\" (UID: \"211b7e18-eb6d-43a0-93f7-75f18a1459e2\") " pod="kube-system/kube-proxy-tf6mz" Nov 1 00:14:47.185582 kubelet[2201]: I1101 00:14:47.185427 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/211b7e18-eb6d-43a0-93f7-75f18a1459e2-lib-modules\") pod \"kube-proxy-tf6mz\" (UID: \"211b7e18-eb6d-43a0-93f7-75f18a1459e2\") " pod="kube-system/kube-proxy-tf6mz" Nov 1 00:14:47.185652 kubelet[2201]: I1101 00:14:47.185636 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-cni-bin-dir\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.185745 kubelet[2201]: I1101 00:14:47.185713 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-policysync\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.185811 kubelet[2201]: I1101 00:14:47.185754 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p7njx\" (UniqueName: \"kubernetes.io/projected/dd520fdf-274f-42b4-b3aa-e252a5875694-kube-api-access-p7njx\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.185882 kubelet[2201]: I1101 00:14:47.185824 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/36aecd38-8986-4e27-8710-f1385049c6a9-kubelet-dir\") pod \"csi-node-driver-9grks\" (UID: \"36aecd38-8986-4e27-8710-f1385049c6a9\") " pod="calico-system/csi-node-driver-9grks" Nov 1 00:14:47.185950 kubelet[2201]: I1101 00:14:47.185889 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-flexvol-driver-host\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186011 kubelet[2201]: I1101 00:14:47.185963 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/36aecd38-8986-4e27-8710-f1385049c6a9-socket-dir\") pod \"csi-node-driver-9grks\" (UID: \"36aecd38-8986-4e27-8710-f1385049c6a9\") " pod="calico-system/csi-node-driver-9grks" Nov 1 00:14:47.186087 kubelet[2201]: I1101 00:14:47.186005 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-xtables-lock\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186087 kubelet[2201]: I1101 00:14:47.186076 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/36aecd38-8986-4e27-8710-f1385049c6a9-registration-dir\") pod \"csi-node-driver-9grks\" (UID: \"36aecd38-8986-4e27-8710-f1385049c6a9\") " pod="calico-system/csi-node-driver-9grks" Nov 1 00:14:47.186209 kubelet[2201]: I1101 00:14:47.186148 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/36aecd38-8986-4e27-8710-f1385049c6a9-varrun\") pod \"csi-node-driver-9grks\" (UID: \"36aecd38-8986-4e27-8710-f1385049c6a9\") " pod="calico-system/csi-node-driver-9grks" Nov 1 00:14:47.186270 kubelet[2201]: I1101 00:14:47.186200 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mwdx2\" (UniqueName: \"kubernetes.io/projected/36aecd38-8986-4e27-8710-f1385049c6a9-kube-api-access-mwdx2\") pod \"csi-node-driver-9grks\" (UID: \"36aecd38-8986-4e27-8710-f1385049c6a9\") " pod="calico-system/csi-node-driver-9grks" Nov 1 00:14:47.186337 kubelet[2201]: I1101 00:14:47.186261 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-cni-net-dir\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186337 kubelet[2201]: I1101 00:14:47.186330 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-lib-modules\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186455 kubelet[2201]: I1101 00:14:47.186369 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dd520fdf-274f-42b4-b3aa-e252a5875694-node-certs\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186455 kubelet[2201]: I1101 00:14:47.186430 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-var-lib-calico\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186620 kubelet[2201]: I1101 00:14:47.186497 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w6fts\" (UniqueName: \"kubernetes.io/projected/211b7e18-eb6d-43a0-93f7-75f18a1459e2-kube-api-access-w6fts\") pod \"kube-proxy-tf6mz\" (UID: \"211b7e18-eb6d-43a0-93f7-75f18a1459e2\") " pod="kube-system/kube-proxy-tf6mz" Nov 1 00:14:47.186620 kubelet[2201]: I1101 00:14:47.186549 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-cni-log-dir\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186620 kubelet[2201]: I1101 00:14:47.186609 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dd520fdf-274f-42b4-b3aa-e252a5875694-tigera-ca-bundle\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186807 kubelet[2201]: I1101 00:14:47.186673 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dd520fdf-274f-42b4-b3aa-e252a5875694-var-run-calico\") pod \"calico-node-vnvg9\" (UID: \"dd520fdf-274f-42b4-b3aa-e252a5875694\") " pod="calico-system/calico-node-vnvg9" Nov 1 00:14:47.186807 kubelet[2201]: I1101 00:14:47.186714 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/211b7e18-eb6d-43a0-93f7-75f18a1459e2-xtables-lock\") pod \"kube-proxy-tf6mz\" (UID: \"211b7e18-eb6d-43a0-93f7-75f18a1459e2\") " pod="kube-system/kube-proxy-tf6mz" Nov 1 00:14:47.287713 kubelet[2201]: I1101 00:14:47.287645 2201 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 00:14:47.300950 kubelet[2201]: E1101 00:14:47.300896 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:47.300950 kubelet[2201]: W1101 00:14:47.300934 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:47.301202 kubelet[2201]: E1101 00:14:47.300968 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:47.328631 kubelet[2201]: E1101 00:14:47.328576 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:47.328631 kubelet[2201]: W1101 00:14:47.328616 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:47.328872 kubelet[2201]: E1101 00:14:47.328651 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:47.340855 kubelet[2201]: E1101 00:14:47.340740 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:47.340855 kubelet[2201]: W1101 00:14:47.340842 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:47.341089 kubelet[2201]: E1101 00:14:47.340875 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:47.355782 kubelet[2201]: E1101 00:14:47.355726 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:47.355782 kubelet[2201]: W1101 00:14:47.355764 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:47.356002 kubelet[2201]: E1101 00:14:47.355797 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:47.484906 env[1808]: time="2025-11-01T00:14:47.479389155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vnvg9,Uid:dd520fdf-274f-42b4-b3aa-e252a5875694,Namespace:calico-system,Attempt:0,}" Nov 1 00:14:47.488759 env[1808]: time="2025-11-01T00:14:47.488676279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tf6mz,Uid:211b7e18-eb6d-43a0-93f7-75f18a1459e2,Namespace:kube-system,Attempt:0,}" Nov 1 00:14:48.093955 env[1808]: time="2025-11-01T00:14:48.093892478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.098911 env[1808]: time="2025-11-01T00:14:48.098834498Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.102326 env[1808]: time="2025-11-01T00:14:48.102260258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.105793 env[1808]: time="2025-11-01T00:14:48.105729542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.109494 env[1808]: time="2025-11-01T00:14:48.109416410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.113136 env[1808]: time="2025-11-01T00:14:48.113087870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.116756 env[1808]: time="2025-11-01T00:14:48.116690894Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.121835 env[1808]: time="2025-11-01T00:14:48.120249542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:48.134780 kubelet[2201]: E1101 00:14:48.134727 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:48.168752 env[1808]: time="2025-11-01T00:14:48.167541171Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:14:48.168752 env[1808]: time="2025-11-01T00:14:48.167630055Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:14:48.168752 env[1808]: time="2025-11-01T00:14:48.167655879Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:14:48.168752 env[1808]: time="2025-11-01T00:14:48.168589683Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f46fff813bd7011b720583644423bb7029685abf0913e4988a8fa7c9208d2a91 pid=2266 runtime=io.containerd.runc.v2 Nov 1 00:14:48.169296 env[1808]: time="2025-11-01T00:14:48.167494311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:14:48.169296 env[1808]: time="2025-11-01T00:14:48.167562207Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:14:48.169296 env[1808]: time="2025-11-01T00:14:48.167587683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:14:48.169296 env[1808]: time="2025-11-01T00:14:48.167979459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a pid=2265 runtime=io.containerd.runc.v2 Nov 1 00:14:48.205784 systemd[1]: Started cri-containerd-94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a.scope. Nov 1 00:14:48.217212 systemd[1]: Started cri-containerd-f46fff813bd7011b720583644423bb7029685abf0913e4988a8fa7c9208d2a91.scope. Nov 1 00:14:48.271505 kernel: kauditd_printk_skb: 276 callbacks suppressed Nov 1 00:14:48.271641 kernel: audit: type=1400 audit(1761956088.267:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.286995 kernel: audit: type=1400 audit(1761956088.267:449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291609 kernel: audit: type=1400 audit(1761956088.267:450): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.304567 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1235292002.mount: Deactivated successfully. Nov 1 00:14:48.312358 kernel: audit: type=1400 audit(1761956088.267:451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.330533 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:14:48.330664 kernel: audit: type=1400 audit(1761956088.267:452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.330738 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Nov 1 00:14:48.330787 kernel: audit: type=1400 audit(1761956088.267:453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.339842 kernel: audit: backlog limit exceeded Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.348871 kernel: audit: type=1400 audit(1761956088.267:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit: BPF prog-id=61 op=LOAD Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2265 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643162353931306665353461383436313937306430353336663965 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2265 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643162353931306665353461383436313937306430353336663965 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.270000 audit: BPF prog-id=62 op=LOAD Nov 1 00:14:48.270000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2265 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643162353931306665353461383436313937306430353336663965 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.278000 audit: BPF prog-id=63 op=LOAD Nov 1 00:14:48.278000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2265 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643162353931306665353461383436313937306430353336663965 Nov 1 00:14:48.286000 audit: BPF prog-id=63 op=UNLOAD Nov 1 00:14:48.291000 audit: BPF prog-id=62 op=UNLOAD Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.291000 audit: BPF prog-id=64 op=LOAD Nov 1 00:14:48.291000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2265 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643162353931306665353461383436313937306430353336663965 Nov 1 00:14:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.353000 audit: BPF prog-id=65 op=LOAD Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2266 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366666663831336264373031316237323035383336343434323362 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2266 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366666663831336264373031316237323035383336343434323362 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.354000 audit: BPF prog-id=66 op=LOAD Nov 1 00:14:48.354000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2266 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366666663831336264373031316237323035383336343434323362 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit: BPF prog-id=67 op=LOAD Nov 1 00:14:48.355000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2266 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366666663831336264373031316237323035383336343434323362 Nov 1 00:14:48.355000 audit: BPF prog-id=67 op=UNLOAD Nov 1 00:14:48.355000 audit: BPF prog-id=66 op=UNLOAD Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:48.355000 audit: BPF prog-id=68 op=LOAD Nov 1 00:14:48.355000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2266 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:48.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366666663831336264373031316237323035383336343434323362 Nov 1 00:14:48.391652 env[1808]: time="2025-11-01T00:14:48.391410700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tf6mz,Uid:211b7e18-eb6d-43a0-93f7-75f18a1459e2,Namespace:kube-system,Attempt:0,} returns sandbox id \"f46fff813bd7011b720583644423bb7029685abf0913e4988a8fa7c9208d2a91\"" Nov 1 00:14:48.394808 env[1808]: time="2025-11-01T00:14:48.394739188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vnvg9,Uid:dd520fdf-274f-42b4-b3aa-e252a5875694,Namespace:calico-system,Attempt:0,} returns sandbox id \"94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a\"" Nov 1 00:14:48.397714 env[1808]: time="2025-11-01T00:14:48.397661800Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Nov 1 00:14:49.135668 kubelet[2201]: E1101 00:14:49.135579 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:49.366758 kubelet[2201]: E1101 00:14:49.366100 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:14:49.806276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4081294389.mount: Deactivated successfully. Nov 1 00:14:50.136442 kubelet[2201]: E1101 00:14:50.136303 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:50.724174 env[1808]: time="2025-11-01T00:14:50.724110907Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:50.726264 env[1808]: time="2025-11-01T00:14:50.726217003Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:50.728211 env[1808]: time="2025-11-01T00:14:50.728163355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:50.730462 env[1808]: time="2025-11-01T00:14:50.730417591Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:50.731316 env[1808]: time="2025-11-01T00:14:50.731261251Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4\"" Nov 1 00:14:50.734903 env[1808]: time="2025-11-01T00:14:50.734853127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 00:14:50.736403 env[1808]: time="2025-11-01T00:14:50.736324867Z" level=info msg="CreateContainer within sandbox \"f46fff813bd7011b720583644423bb7029685abf0913e4988a8fa7c9208d2a91\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 00:14:50.760252 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount267139267.mount: Deactivated successfully. Nov 1 00:14:50.772066 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3907689483.mount: Deactivated successfully. Nov 1 00:14:50.778067 env[1808]: time="2025-11-01T00:14:50.778001396Z" level=info msg="CreateContainer within sandbox \"f46fff813bd7011b720583644423bb7029685abf0913e4988a8fa7c9208d2a91\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"70712203831054470ee69cee65c684fc5a7584e012f8ec468b6c7ae19818c36e\"" Nov 1 00:14:50.779555 env[1808]: time="2025-11-01T00:14:50.779504120Z" level=info msg="StartContainer for \"70712203831054470ee69cee65c684fc5a7584e012f8ec468b6c7ae19818c36e\"" Nov 1 00:14:50.821681 systemd[1]: run-containerd-runc-k8s.io-70712203831054470ee69cee65c684fc5a7584e012f8ec468b6c7ae19818c36e-runc.2gbr6s.mount: Deactivated successfully. Nov 1 00:14:50.831372 systemd[1]: Started cri-containerd-70712203831054470ee69cee65c684fc5a7584e012f8ec468b6c7ae19818c36e.scope. Nov 1 00:14:50.869000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.869000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2266 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:50.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373132323033383331303534343730656536396365653635633638 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit: BPF prog-id=69 op=LOAD Nov 1 00:14:50.870000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2266 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:50.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373132323033383331303534343730656536396365653635633638 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit: BPF prog-id=70 op=LOAD Nov 1 00:14:50.870000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2266 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:50.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373132323033383331303534343730656536396365653635633638 Nov 1 00:14:50.870000 audit: BPF prog-id=70 op=UNLOAD Nov 1 00:14:50.870000 audit: BPF prog-id=69 op=UNLOAD Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:50.870000 audit: BPF prog-id=71 op=LOAD Nov 1 00:14:50.870000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2266 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:50.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730373132323033383331303534343730656536396365653635633638 Nov 1 00:14:50.906065 env[1808]: time="2025-11-01T00:14:50.906004088Z" level=info msg="StartContainer for \"70712203831054470ee69cee65c684fc5a7584e012f8ec468b6c7ae19818c36e\" returns successfully" Nov 1 00:14:51.138567 kubelet[2201]: E1101 00:14:51.138348 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:51.148000 audit[2405]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.148000 audit[2405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7ca97d0 a2=0 a3=1 items=0 ppid=2356 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:14:51.151000 audit[2407]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.151000 audit[2407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb740950 a2=0 a3=1 items=0 ppid=2356 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:14:51.151000 audit[2408]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.151000 audit[2408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0118b40 a2=0 a3=1 items=0 ppid=2356 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:14:51.154000 audit[2409]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.154000 audit[2409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5d5b940 a2=0 a3=1 items=0 ppid=2356 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:14:51.155000 audit[2410]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.155000 audit[2410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3b9a480 a2=0 a3=1 items=0 ppid=2356 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:14:51.168000 audit[2411]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.168000 audit[2411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3f90620 a2=0 a3=1 items=0 ppid=2356 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:14:51.258000 audit[2412]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.258000 audit[2412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc19f2cf0 a2=0 a3=1 items=0 ppid=2356 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:14:51.265000 audit[2414]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.265000 audit[2414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe2c7d400 a2=0 a3=1 items=0 ppid=2356 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Nov 1 00:14:51.273000 audit[2417]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.273000 audit[2417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffca477240 a2=0 a3=1 items=0 ppid=2356 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Nov 1 00:14:51.277000 audit[2418]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.277000 audit[2418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4415b20 a2=0 a3=1 items=0 ppid=2356 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:14:51.282000 audit[2420]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.282000 audit[2420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcaa4c3a0 a2=0 a3=1 items=0 ppid=2356 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:14:51.285000 audit[2421]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.285000 audit[2421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea1af290 a2=0 a3=1 items=0 ppid=2356 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:14:51.291000 audit[2423]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.291000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdef56650 a2=0 a3=1 items=0 ppid=2356 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:14:51.299000 audit[2426]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.299000 audit[2426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe242c260 a2=0 a3=1 items=0 ppid=2356 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Nov 1 00:14:51.303000 audit[2427]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.303000 audit[2427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb21ca70 a2=0 a3=1 items=0 ppid=2356 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:14:51.309000 audit[2429]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.309000 audit[2429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffec733260 a2=0 a3=1 items=0 ppid=2356 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:14:51.311000 audit[2430]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.311000 audit[2430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd131100 a2=0 a3=1 items=0 ppid=2356 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:14:51.318000 audit[2432]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.318000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5606100 a2=0 a3=1 items=0 ppid=2356 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:14:51.326000 audit[2435]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.326000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcf39adf0 a2=0 a3=1 items=0 ppid=2356 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:14:51.333000 audit[2438]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.333000 audit[2438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff1ed9540 a2=0 a3=1 items=0 ppid=2356 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:14:51.335000 audit[2439]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.335000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff144dca0 a2=0 a3=1 items=0 ppid=2356 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:14:51.367482 kubelet[2201]: E1101 00:14:51.366704 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:14:51.340000 audit[2441]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.340000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffc1310a0 a2=0 a3=1 items=0 ppid=2356 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:14:51.380000 audit[2445]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.380000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd8b6a030 a2=0 a3=1 items=0 ppid=2356 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:14:51.382000 audit[2446]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.382000 audit[2446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2be5bf0 a2=0 a3=1 items=0 ppid=2356 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:14:51.390000 audit[2448]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:14:51.390000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc23b42b0 a2=0 a3=1 items=0 ppid=2356 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.390000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:14:51.401641 kubelet[2201]: E1101 00:14:51.401597 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.401641 kubelet[2201]: W1101 00:14:51.401637 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.401923 kubelet[2201]: E1101 00:14:51.401671 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.402318 kubelet[2201]: E1101 00:14:51.402284 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.402456 kubelet[2201]: W1101 00:14:51.402317 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.402613 kubelet[2201]: E1101 00:14:51.402456 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.404026 kubelet[2201]: E1101 00:14:51.403666 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.404026 kubelet[2201]: W1101 00:14:51.403729 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.404026 kubelet[2201]: E1101 00:14:51.403761 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.405042 kubelet[2201]: E1101 00:14:51.404459 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.405042 kubelet[2201]: W1101 00:14:51.404601 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.405042 kubelet[2201]: E1101 00:14:51.404630 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.405670 kubelet[2201]: E1101 00:14:51.405445 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.405670 kubelet[2201]: W1101 00:14:51.405500 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.405670 kubelet[2201]: E1101 00:14:51.405528 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.406294 kubelet[2201]: E1101 00:14:51.406263 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.406464 kubelet[2201]: W1101 00:14:51.406435 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.406649 kubelet[2201]: E1101 00:14:51.406622 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.407148 kubelet[2201]: E1101 00:14:51.407120 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.407297 kubelet[2201]: W1101 00:14:51.407271 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.407518 kubelet[2201]: E1101 00:14:51.407460 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.408059 kubelet[2201]: E1101 00:14:51.408031 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.408228 kubelet[2201]: W1101 00:14:51.408201 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.408347 kubelet[2201]: E1101 00:14:51.408322 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.408854 kubelet[2201]: E1101 00:14:51.408827 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.409039 kubelet[2201]: W1101 00:14:51.409012 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.409188 kubelet[2201]: E1101 00:14:51.409163 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.409673 kubelet[2201]: E1101 00:14:51.409648 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.409822 kubelet[2201]: W1101 00:14:51.409795 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.409945 kubelet[2201]: E1101 00:14:51.409918 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.410408 kubelet[2201]: E1101 00:14:51.410384 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.410635 kubelet[2201]: W1101 00:14:51.410608 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.410795 kubelet[2201]: E1101 00:14:51.410768 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.411373 kubelet[2201]: E1101 00:14:51.411325 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.411626 kubelet[2201]: W1101 00:14:51.411573 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.411907 kubelet[2201]: E1101 00:14:51.411880 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.413058 kubelet[2201]: E1101 00:14:51.413025 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.413237 kubelet[2201]: W1101 00:14:51.413211 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.413386 kubelet[2201]: E1101 00:14:51.413361 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.413992 kubelet[2201]: E1101 00:14:51.413962 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.414150 kubelet[2201]: W1101 00:14:51.414124 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.414293 kubelet[2201]: E1101 00:14:51.414268 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.414838 kubelet[2201]: E1101 00:14:51.414811 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.414996 kubelet[2201]: W1101 00:14:51.414968 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.415152 kubelet[2201]: E1101 00:14:51.415125 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.415785 kubelet[2201]: E1101 00:14:51.415758 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.415949 kubelet[2201]: W1101 00:14:51.415923 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.416073 kubelet[2201]: E1101 00:14:51.416047 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.418707 kubelet[2201]: E1101 00:14:51.418657 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.418707 kubelet[2201]: W1101 00:14:51.418697 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.418952 kubelet[2201]: E1101 00:14:51.418730 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.419294 kubelet[2201]: E1101 00:14:51.419260 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.419395 kubelet[2201]: W1101 00:14:51.419297 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.419395 kubelet[2201]: E1101 00:14:51.419323 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.419804 kubelet[2201]: E1101 00:14:51.419770 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.419804 kubelet[2201]: W1101 00:14:51.419799 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.419974 kubelet[2201]: E1101 00:14:51.419822 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.420270 kubelet[2201]: E1101 00:14:51.420236 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.420270 kubelet[2201]: W1101 00:14:51.420264 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.420394 kubelet[2201]: E1101 00:14:51.420287 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.425669 kubelet[2201]: E1101 00:14:51.425618 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.425669 kubelet[2201]: W1101 00:14:51.425658 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.425907 kubelet[2201]: E1101 00:14:51.425691 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.426226 kubelet[2201]: E1101 00:14:51.426191 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.426226 kubelet[2201]: W1101 00:14:51.426221 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.426359 kubelet[2201]: E1101 00:14:51.426255 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.426709 kubelet[2201]: E1101 00:14:51.426673 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.426709 kubelet[2201]: W1101 00:14:51.426703 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.426870 kubelet[2201]: E1101 00:14:51.426738 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.427192 kubelet[2201]: E1101 00:14:51.427155 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.427192 kubelet[2201]: W1101 00:14:51.427185 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.427364 kubelet[2201]: E1101 00:14:51.427217 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.428130 kubelet[2201]: E1101 00:14:51.427639 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.428130 kubelet[2201]: W1101 00:14:51.427670 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.428130 kubelet[2201]: E1101 00:14:51.427827 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.428130 kubelet[2201]: E1101 00:14:51.428059 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.428130 kubelet[2201]: W1101 00:14:51.428081 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.428130 kubelet[2201]: E1101 00:14:51.428110 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.428544 kubelet[2201]: E1101 00:14:51.428464 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.428544 kubelet[2201]: W1101 00:14:51.428499 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.428544 kubelet[2201]: E1101 00:14:51.428529 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.428937 kubelet[2201]: E1101 00:14:51.428893 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.428937 kubelet[2201]: W1101 00:14:51.428924 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.429073 kubelet[2201]: E1101 00:14:51.428957 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.429357 kubelet[2201]: E1101 00:14:51.429328 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.429428 kubelet[2201]: W1101 00:14:51.429355 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.429657 kubelet[2201]: E1101 00:14:51.429579 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.430293 kubelet[2201]: E1101 00:14:51.430100 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.430293 kubelet[2201]: W1101 00:14:51.430131 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.430293 kubelet[2201]: E1101 00:14:51.430164 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.433559 kubelet[2201]: E1101 00:14:51.431782 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.433559 kubelet[2201]: W1101 00:14:51.431817 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.433559 kubelet[2201]: E1101 00:14:51.431853 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.434091 kubelet[2201]: E1101 00:14:51.434038 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:14:51.434176 kubelet[2201]: W1101 00:14:51.434089 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:14:51.434176 kubelet[2201]: E1101 00:14:51.434118 2201 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:14:51.447000 audit[2467]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:14:51.447000 audit[2467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff9e90a50 a2=0 a3=1 items=0 ppid=2356 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:14:51.483000 audit[2467]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:14:51.483000 audit[2467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25476 a0=3 a1=fffff9e90a50 a2=0 a3=1 items=0 ppid=2356 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:14:51.503000 audit[2495]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.503000 audit[2495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcbfb6650 a2=0 a3=1 items=0 ppid=2356 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:14:51.509000 audit[2497]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.509000 audit[2497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc70695b0 a2=0 a3=1 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Nov 1 00:14:51.521000 audit[2500]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.521000 audit[2500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcb89ee70 a2=0 a3=1 items=0 ppid=2356 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Nov 1 00:14:51.524000 audit[2501]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.524000 audit[2501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4d55740 a2=0 a3=1 items=0 ppid=2356 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:14:51.530000 audit[2503]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.530000 audit[2503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd727c210 a2=0 a3=1 items=0 ppid=2356 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:14:51.533000 audit[2504]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2504 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.533000 audit[2504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2c91640 a2=0 a3=1 items=0 ppid=2356 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:14:51.540000 audit[2506]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2506 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.540000 audit[2506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe5cb1c70 a2=0 a3=1 items=0 ppid=2356 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Nov 1 00:14:51.548000 audit[2509]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.548000 audit[2509]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe07d7a80 a2=0 a3=1 items=0 ppid=2356 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:14:51.552000 audit[2510]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.552000 audit[2510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc27e3da0 a2=0 a3=1 items=0 ppid=2356 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:14:51.557000 audit[2512]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.557000 audit[2512]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe276b710 a2=0 a3=1 items=0 ppid=2356 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:14:51.559000 audit[2513]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2513 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.559000 audit[2513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcae21940 a2=0 a3=1 items=0 ppid=2356 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:14:51.565000 audit[2515]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2515 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.565000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe2ae3730 a2=0 a3=1 items=0 ppid=2356 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:14:51.575000 audit[2518]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2518 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.575000 audit[2518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe1157330 a2=0 a3=1 items=0 ppid=2356 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:14:51.584000 audit[2521]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.584000 audit[2521]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd33ef370 a2=0 a3=1 items=0 ppid=2356 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Nov 1 00:14:51.587000 audit[2522]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2522 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.587000 audit[2522]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcfbba5c0 a2=0 a3=1 items=0 ppid=2356 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:14:51.592000 audit[2524]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2524 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.592000 audit[2524]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc85c0800 a2=0 a3=1 items=0 ppid=2356 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:14:51.599000 audit[2527]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2527 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.599000 audit[2527]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdb9ecc90 a2=0 a3=1 items=0 ppid=2356 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:14:51.602000 audit[2528]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.602000 audit[2528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa16f8f0 a2=0 a3=1 items=0 ppid=2356 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:14:51.608000 audit[2530]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2530 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.608000 audit[2530]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc57e9420 a2=0 a3=1 items=0 ppid=2356 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:14:51.611000 audit[2531]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2531 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.611000 audit[2531]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea8c0df0 a2=0 a3=1 items=0 ppid=2356 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:14:51.617000 audit[2533]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.617000 audit[2533]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd3d614e0 a2=0 a3=1 items=0 ppid=2356 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:14:51.625000 audit[2536]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:14:51.625000 audit[2536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdecf3950 a2=0 a3=1 items=0 ppid=2356 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:14:51.637000 audit[2538]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:14:51.637000 audit[2538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc0711800 a2=0 a3=1 items=0 ppid=2356 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.637000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:14:51.639000 audit[2538]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:14:51.639000 audit[2538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc0711800 a2=0 a3=1 items=0 ppid=2356 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:51.639000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:14:51.786492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1374758932.mount: Deactivated successfully. Nov 1 00:14:51.989864 env[1808]: time="2025-11-01T00:14:51.989803774Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:51.995042 env[1808]: time="2025-11-01T00:14:51.994995106Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:51.997786 env[1808]: time="2025-11-01T00:14:51.997738498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:52.000991 env[1808]: time="2025-11-01T00:14:52.000941802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:52.001977 env[1808]: time="2025-11-01T00:14:52.001925598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640\"" Nov 1 00:14:52.006273 env[1808]: time="2025-11-01T00:14:52.006213186Z" level=info msg="CreateContainer within sandbox \"94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 00:14:52.042007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount155584216.mount: Deactivated successfully. Nov 1 00:14:52.055016 env[1808]: time="2025-11-01T00:14:52.054954558Z" level=info msg="CreateContainer within sandbox \"94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9\"" Nov 1 00:14:52.056310 env[1808]: time="2025-11-01T00:14:52.056263134Z" level=info msg="StartContainer for \"33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9\"" Nov 1 00:14:52.090812 systemd[1]: Started cri-containerd-33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9.scope. Nov 1 00:14:52.103771 systemd[1]: run-containerd-runc-k8s.io-33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9-runc.vUcpdS.mount: Deactivated successfully. Nov 1 00:14:52.138995 kubelet[2201]: E1101 00:14:52.138921 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:52.148000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.148000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2265 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:52.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333636430353162353066333433316361616134336365303965626437 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit: BPF prog-id=72 op=LOAD Nov 1 00:14:52.149000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2265 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:52.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333636430353162353066333433316361616134336365303965626437 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit: BPF prog-id=73 op=LOAD Nov 1 00:14:52.149000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2265 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:52.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333636430353162353066333433316361616134336365303965626437 Nov 1 00:14:52.149000 audit: BPF prog-id=73 op=UNLOAD Nov 1 00:14:52.149000 audit: BPF prog-id=72 op=UNLOAD Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:52.149000 audit: BPF prog-id=74 op=LOAD Nov 1 00:14:52.149000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2265 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:52.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333636430353162353066333433316361616134336365303965626437 Nov 1 00:14:52.189656 env[1808]: time="2025-11-01T00:14:52.189593731Z" level=info msg="StartContainer for \"33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9\" returns successfully" Nov 1 00:14:52.215971 systemd[1]: cri-containerd-33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9.scope: Deactivated successfully. Nov 1 00:14:52.218000 audit: BPF prog-id=74 op=UNLOAD Nov 1 00:14:52.420446 kubelet[2201]: I1101 00:14:52.420343 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-tf6mz" podStartSLOduration=5.082879157 podStartE2EDuration="7.420322724s" podCreationTimestamp="2025-11-01 00:14:45 +0000 UTC" firstStartedPulling="2025-11-01 00:14:48.396353656 +0000 UTC m=+4.015998153" lastFinishedPulling="2025-11-01 00:14:50.733797151 +0000 UTC m=+6.353441720" observedRunningTime="2025-11-01 00:14:51.413862043 +0000 UTC m=+7.033506588" watchObservedRunningTime="2025-11-01 00:14:52.420322724 +0000 UTC m=+8.039967233" Nov 1 00:14:52.450026 env[1808]: time="2025-11-01T00:14:52.449654240Z" level=info msg="shim disconnected" id=33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9 Nov 1 00:14:52.450026 env[1808]: time="2025-11-01T00:14:52.449721488Z" level=warning msg="cleaning up after shim disconnected" id=33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9 namespace=k8s.io Nov 1 00:14:52.450026 env[1808]: time="2025-11-01T00:14:52.449742236Z" level=info msg="cleaning up dead shim" Nov 1 00:14:52.463085 env[1808]: time="2025-11-01T00:14:52.463029020Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:14:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2590 runtime=io.containerd.runc.v2\n" Nov 1 00:14:53.035429 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-33cd051b50f3431caaa43ce09ebd76af2deee12ada442cd1992e7676088d93d9-rootfs.mount: Deactivated successfully. Nov 1 00:14:53.139308 kubelet[2201]: E1101 00:14:53.139249 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:53.366863 kubelet[2201]: E1101 00:14:53.366041 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:14:53.398208 env[1808]: time="2025-11-01T00:14:53.398081661Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 00:14:54.139846 kubelet[2201]: E1101 00:14:54.139769 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:55.139993 kubelet[2201]: E1101 00:14:55.139910 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:55.366146 kubelet[2201]: E1101 00:14:55.366075 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:14:56.140311 kubelet[2201]: E1101 00:14:56.140205 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:56.946914 env[1808]: time="2025-11-01T00:14:56.946847618Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:56.950126 env[1808]: time="2025-11-01T00:14:56.950054282Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:56.952866 env[1808]: time="2025-11-01T00:14:56.952781678Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:56.955513 env[1808]: time="2025-11-01T00:14:56.955406954Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:14:56.957083 env[1808]: time="2025-11-01T00:14:56.957006602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2\"" Nov 1 00:14:56.963782 env[1808]: time="2025-11-01T00:14:56.963726062Z" level=info msg="CreateContainer within sandbox \"94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 00:14:56.984256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1607645463.mount: Deactivated successfully. Nov 1 00:14:56.991292 env[1808]: time="2025-11-01T00:14:56.991224459Z" level=info msg="CreateContainer within sandbox \"94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe\"" Nov 1 00:14:56.992309 env[1808]: time="2025-11-01T00:14:56.992254899Z" level=info msg="StartContainer for \"f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe\"" Nov 1 00:14:57.033115 systemd[1]: Started cri-containerd-f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe.scope. Nov 1 00:14:57.041626 systemd[1]: run-containerd-runc-k8s.io-f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe-runc.c6iFgo.mount: Deactivated successfully. Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094973 kernel: kauditd_printk_skb: 346 callbacks suppressed Nov 1 00:14:57.095069 kernel: audit: type=1400 audit(1761956097.091:547): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2265 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.113628 kernel: audit: type=1300 audit(1761956097.091:547): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2265 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.113749 kernel: audit: type=1327 audit(1761956097.091:547): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633638373939656665373134656531363230373930616364626238 Nov 1 00:14:57.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633638373939656665373134656531363230373930616364626238 Nov 1 00:14:57.124202 kernel: audit: type=1400 audit(1761956097.091:548): avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.131614 kernel: audit: type=1400 audit(1761956097.091:548): avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.141502 kubelet[2201]: E1101 00:14:57.141373 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:57.146226 kernel: audit: type=1400 audit(1761956097.091:548): avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.155798 kernel: audit: type=1400 audit(1761956097.091:548): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.163998 kernel: audit: type=1400 audit(1761956097.091:548): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.172340 kernel: audit: type=1400 audit(1761956097.091:548): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.180325 kernel: audit: type=1400 audit(1761956097.091:548): avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.091000 audit: BPF prog-id=75 op=LOAD Nov 1 00:14:57.091000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2265 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633638373939656665373134656531363230373930616364626238 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.094000 audit: BPF prog-id=76 op=LOAD Nov 1 00:14:57.094000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2265 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633638373939656665373134656531363230373930616364626238 Nov 1 00:14:57.101000 audit: BPF prog-id=76 op=UNLOAD Nov 1 00:14:57.101000 audit: BPF prog-id=75 op=UNLOAD Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:57.101000 audit: BPF prog-id=77 op=LOAD Nov 1 00:14:57.101000 audit[2610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2265 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639633638373939656665373134656531363230373930616364626238 Nov 1 00:14:57.198450 env[1808]: time="2025-11-01T00:14:57.198316440Z" level=info msg="StartContainer for \"f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe\" returns successfully" Nov 1 00:14:57.366389 kubelet[2201]: E1101 00:14:57.366315 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:14:58.142378 kubelet[2201]: E1101 00:14:58.142321 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:58.350617 env[1808]: time="2025-11-01T00:14:58.350362249Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:14:58.355699 kubelet[2201]: I1101 00:14:58.355631 2201 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Nov 1 00:14:58.356568 systemd[1]: cri-containerd-f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe.scope: Deactivated successfully. Nov 1 00:14:58.357016 systemd[1]: cri-containerd-f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe.scope: Consumed 1.110s CPU time. Nov 1 00:14:58.360000 audit: BPF prog-id=77 op=UNLOAD Nov 1 00:14:58.393454 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe-rootfs.mount: Deactivated successfully. Nov 1 00:14:58.884234 env[1808]: time="2025-11-01T00:14:58.884160328Z" level=info msg="shim disconnected" id=f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe Nov 1 00:14:58.884636 env[1808]: time="2025-11-01T00:14:58.884599492Z" level=warning msg="cleaning up after shim disconnected" id=f9c68799efe714ee1620790acdbb8f523a04d5ac18d70c69c8e1857a8fe3b7fe namespace=k8s.io Nov 1 00:14:58.884759 env[1808]: time="2025-11-01T00:14:58.884731048Z" level=info msg="cleaning up dead shim" Nov 1 00:14:58.898700 env[1808]: time="2025-11-01T00:14:58.898643224Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:14:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2650 runtime=io.containerd.runc.v2\n" Nov 1 00:14:59.144637 kubelet[2201]: E1101 00:14:59.144161 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:14:59.378758 systemd[1]: Created slice kubepods-besteffort-pod36aecd38_8986_4e27_8710_f1385049c6a9.slice. Nov 1 00:14:59.383864 env[1808]: time="2025-11-01T00:14:59.383787902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grks,Uid:36aecd38-8986-4e27-8710-f1385049c6a9,Namespace:calico-system,Attempt:0,}" Nov 1 00:14:59.423837 env[1808]: time="2025-11-01T00:14:59.423785331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 00:14:59.543657 env[1808]: time="2025-11-01T00:14:59.543532767Z" level=error msg="Failed to destroy network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:14:59.546711 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00-shm.mount: Deactivated successfully. Nov 1 00:14:59.549589 env[1808]: time="2025-11-01T00:14:59.549465867Z" level=error msg="encountered an error cleaning up failed sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:14:59.549754 env[1808]: time="2025-11-01T00:14:59.549615639Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grks,Uid:36aecd38-8986-4e27-8710-f1385049c6a9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:14:59.550022 kubelet[2201]: E1101 00:14:59.549949 2201 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:14:59.550121 kubelet[2201]: E1101 00:14:59.550048 2201 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9grks" Nov 1 00:14:59.550121 kubelet[2201]: E1101 00:14:59.550088 2201 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9grks" Nov 1 00:14:59.550261 kubelet[2201]: E1101 00:14:59.550150 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:15:00.145400 kubelet[2201]: E1101 00:15:00.145330 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:00.425013 kubelet[2201]: I1101 00:15:00.424970 2201 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:00.426141 env[1808]: time="2025-11-01T00:15:00.426090856Z" level=info msg="StopPodSandbox for \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\"" Nov 1 00:15:00.467598 env[1808]: time="2025-11-01T00:15:00.467522644Z" level=error msg="StopPodSandbox for \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\" failed" error="failed to destroy network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:00.468202 kubelet[2201]: E1101 00:15:00.468112 2201 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:00.468341 kubelet[2201]: E1101 00:15:00.468255 2201 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00"} Nov 1 00:15:00.468419 kubelet[2201]: E1101 00:15:00.468374 2201 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"36aecd38-8986-4e27-8710-f1385049c6a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:15:00.468570 kubelet[2201]: E1101 00:15:00.468441 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"36aecd38-8986-4e27-8710-f1385049c6a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:15:00.856351 systemd-timesyncd[1758]: Contacted time server 198.137.202.32:123 (2.flatcar.pool.ntp.org). Nov 1 00:15:00.857561 systemd-timesyncd[1758]: Initial clock synchronization to Sat 2025-11-01 00:15:00.806246 UTC. Nov 1 00:15:01.145690 kubelet[2201]: E1101 00:15:01.145539 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:01.648501 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 1 00:15:01.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:01.669000 audit: BPF prog-id=45 op=UNLOAD Nov 1 00:15:01.669000 audit: BPF prog-id=44 op=UNLOAD Nov 1 00:15:01.669000 audit: BPF prog-id=43 op=UNLOAD Nov 1 00:15:02.145750 kubelet[2201]: E1101 00:15:02.145680 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:03.146434 kubelet[2201]: E1101 00:15:03.146364 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:03.526209 systemd[1]: Created slice kubepods-besteffort-pod88b0b19f_3e1c_493e_90b0_a78bb677c316.slice. Nov 1 00:15:03.614228 kubelet[2201]: I1101 00:15:03.614107 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tcmhs\" (UniqueName: \"kubernetes.io/projected/88b0b19f-3e1c-493e-90b0-a78bb677c316-kube-api-access-tcmhs\") pod \"nginx-deployment-7fcdb87857-rsx29\" (UID: \"88b0b19f-3e1c-493e-90b0-a78bb677c316\") " pod="default/nginx-deployment-7fcdb87857-rsx29" Nov 1 00:15:03.833278 env[1808]: time="2025-11-01T00:15:03.833136264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rsx29,Uid:88b0b19f-3e1c-493e-90b0-a78bb677c316,Namespace:default,Attempt:0,}" Nov 1 00:15:03.977445 env[1808]: time="2025-11-01T00:15:03.977372475Z" level=error msg="Failed to destroy network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:03.980858 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f-shm.mount: Deactivated successfully. Nov 1 00:15:03.982800 env[1808]: time="2025-11-01T00:15:03.982725678Z" level=error msg="encountered an error cleaning up failed sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:03.983088 env[1808]: time="2025-11-01T00:15:03.983013634Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rsx29,Uid:88b0b19f-3e1c-493e-90b0-a78bb677c316,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:03.984245 kubelet[2201]: E1101 00:15:03.983612 2201 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:03.984245 kubelet[2201]: E1101 00:15:03.983737 2201 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-rsx29" Nov 1 00:15:03.984245 kubelet[2201]: E1101 00:15:03.983774 2201 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-rsx29" Nov 1 00:15:03.984587 kubelet[2201]: E1101 00:15:03.983875 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-rsx29_default(88b0b19f-3e1c-493e-90b0-a78bb677c316)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-rsx29_default(88b0b19f-3e1c-493e-90b0-a78bb677c316)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-rsx29" podUID="88b0b19f-3e1c-493e-90b0-a78bb677c316" Nov 1 00:15:04.147909 kubelet[2201]: E1101 00:15:04.147075 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:04.435538 kubelet[2201]: I1101 00:15:04.435433 2201 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:04.436372 env[1808]: time="2025-11-01T00:15:04.436315641Z" level=info msg="StopPodSandbox for \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\"" Nov 1 00:15:04.504422 env[1808]: time="2025-11-01T00:15:04.504349952Z" level=error msg="StopPodSandbox for \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\" failed" error="failed to destroy network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:04.505118 kubelet[2201]: E1101 00:15:04.504887 2201 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:04.505118 kubelet[2201]: E1101 00:15:04.504964 2201 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f"} Nov 1 00:15:04.505118 kubelet[2201]: E1101 00:15:04.505020 2201 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88b0b19f-3e1c-493e-90b0-a78bb677c316\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:15:04.505118 kubelet[2201]: E1101 00:15:04.505059 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88b0b19f-3e1c-493e-90b0-a78bb677c316\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-rsx29" podUID="88b0b19f-3e1c-493e-90b0-a78bb677c316" Nov 1 00:15:05.131989 kubelet[2201]: E1101 00:15:05.131920 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:05.147894 kubelet[2201]: E1101 00:15:05.147819 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:06.148155 kubelet[2201]: E1101 00:15:06.148078 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:07.148993 kubelet[2201]: E1101 00:15:07.148935 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:07.645201 kernel: kauditd_printk_skb: 38 callbacks suppressed Nov 1 00:15:07.645355 kernel: audit: type=1130 audit(1761956107.633:558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.24.1:22-4.4.66.82:53848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:07.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.24.1:22-4.4.66.82:53848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:07.634153 systemd[1]: Started sshd@7-172.31.24.1:22-4.4.66.82:53848.service. Nov 1 00:15:08.149137 kubelet[2201]: E1101 00:15:08.149072 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:08.308294 sshd[2751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:08.308000 audit[2751]: USER_AUTH pid=2751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:08.317612 kernel: audit: type=1100 audit(1761956108.308:559): pid=2751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:08.831043 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2277804168.mount: Deactivated successfully. Nov 1 00:15:08.883183 env[1808]: time="2025-11-01T00:15:08.883095588Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:08.885922 env[1808]: time="2025-11-01T00:15:08.885855798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:08.888136 env[1808]: time="2025-11-01T00:15:08.888081219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:08.890781 env[1808]: time="2025-11-01T00:15:08.890714493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:08.891858 env[1808]: time="2025-11-01T00:15:08.891806922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b\"" Nov 1 00:15:08.923045 env[1808]: time="2025-11-01T00:15:08.922991131Z" level=info msg="CreateContainer within sandbox \"94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 00:15:08.950991 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1098335170.mount: Deactivated successfully. Nov 1 00:15:08.956391 env[1808]: time="2025-11-01T00:15:08.956309633Z" level=info msg="CreateContainer within sandbox \"94d1b5910fe54a8461970d0536f9e7706e1d9ff0dbe928a4772b2262e82ab70a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68\"" Nov 1 00:15:08.957411 env[1808]: time="2025-11-01T00:15:08.957349486Z" level=info msg="StartContainer for \"9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68\"" Nov 1 00:15:08.988375 systemd[1]: Started cri-containerd-9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68.scope. Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2265 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.056719 kernel: audit: type=1400 audit(1761956109.035:560): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.056829 kernel: audit: type=1300 audit(1761956109.035:560): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2265 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.056891 kernel: audit: type=1327 audit(1761956109.035:560): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376536303061373261643630346536653535356332313938396132 Nov 1 00:15:09.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376536303061373261643630346536653535356332313938396132 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.067691 kernel: audit: type=1400 audit(1761956109.035:561): avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.083183 kernel: audit: type=1400 audit(1761956109.035:561): avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.095134 kernel: audit: type=1400 audit(1761956109.035:561): avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.095248 kernel: audit: type=1400 audit(1761956109.035:561): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.113715 kernel: audit: type=1400 audit(1761956109.035:561): avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.035000 audit: BPF prog-id=78 op=LOAD Nov 1 00:15:09.035000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2265 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376536303061373261643630346536653535356332313938396132 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.036000 audit: BPF prog-id=79 op=LOAD Nov 1 00:15:09.036000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2265 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376536303061373261643630346536653535356332313938396132 Nov 1 00:15:09.044000 audit: BPF prog-id=79 op=UNLOAD Nov 1 00:15:09.044000 audit: BPF prog-id=78 op=UNLOAD Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:09.044000 audit: BPF prog-id=80 op=LOAD Nov 1 00:15:09.044000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2265 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964376536303061373261643630346536653535356332313938396132 Nov 1 00:15:09.120529 env[1808]: time="2025-11-01T00:15:09.118128355Z" level=info msg="StartContainer for \"9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68\" returns successfully" Nov 1 00:15:09.149579 kubelet[2201]: E1101 00:15:09.149455 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:09.382191 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 00:15:09.382392 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 00:15:10.150624 kubelet[2201]: E1101 00:15:10.150557 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:10.192764 sshd[2751]: Failed password for root from 4.4.66.82 port 53848 ssh2 Nov 1 00:15:10.487029 systemd[1]: run-containerd-runc-k8s.io-9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68-runc.zzvHx6.mount: Deactivated successfully. Nov 1 00:15:10.951000 audit[2919]: AVC avc: denied { write } for pid=2919 comm="tee" name="fd" dev="proc" ino=15943 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:10.951000 audit[2919]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffca49b7e4 a2=241 a3=1b6 items=1 ppid=2879 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:10.951000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 00:15:10.951000 audit: PATH item=0 name="/dev/fd/63" inode=15162 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:10.951000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:10.955000 audit[2904]: AVC avc: denied { write } for pid=2904 comm="tee" name="fd" dev="proc" ino=15168 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:10.956000 audit[2913]: AVC avc: denied { write } for pid=2913 comm="tee" name="fd" dev="proc" ino=15171 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:10.955000 audit[2904]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe52827d2 a2=241 a3=1b6 items=1 ppid=2874 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:10.955000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 00:15:10.955000 audit: PATH item=0 name="/dev/fd/63" inode=15933 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:10.957000 audit[2923]: AVC avc: denied { write } for pid=2923 comm="tee" name="fd" dev="proc" ino=15949 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:10.957000 audit[2923]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd98157e3 a2=241 a3=1b6 items=1 ppid=2883 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:10.957000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 00:15:10.957000 audit: PATH item=0 name="/dev/fd/63" inode=15937 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:10.957000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:10.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:10.958000 audit[2909]: AVC avc: denied { write } for pid=2909 comm="tee" name="fd" dev="proc" ino=15173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:10.958000 audit[2909]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdda2d7e2 a2=241 a3=1b6 items=1 ppid=2872 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:10.958000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 00:15:10.958000 audit: PATH item=0 name="/dev/fd/63" inode=15160 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:10.958000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:10.956000 audit[2913]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffac217d3 a2=241 a3=1b6 items=1 ppid=2873 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:10.956000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 00:15:10.956000 audit: PATH item=0 name="/dev/fd/63" inode=15161 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:10.956000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:10.975000 audit[2921]: AVC avc: denied { write } for pid=2921 comm="tee" name="fd" dev="proc" ino=15959 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:10.975000 audit[2921]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff40497e2 a2=241 a3=1b6 items=1 ppid=2881 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:10.975000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 00:15:10.975000 audit: PATH item=0 name="/dev/fd/63" inode=15936 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:10.975000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:10.978000 audit[2930]: AVC avc: denied { write } for pid=2930 comm="tee" name="fd" dev="proc" ino=15961 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:10.978000 audit[2930]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7d9c7e2 a2=241 a3=1b6 items=1 ppid=2890 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:10.978000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 00:15:10.978000 audit: PATH item=0 name="/dev/fd/63" inode=15939 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:10.978000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:11.151432 kubelet[2201]: E1101 00:15:11.151330 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.448000 audit: BPF prog-id=81 op=LOAD Nov 1 00:15:11.448000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffffd728c8 a2=98 a3=ffffffd728b8 items=0 ppid=2891 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.448000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:11.450000 audit: BPF prog-id=81 op=UNLOAD Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.450000 audit: BPF prog-id=82 op=LOAD Nov 1 00:15:11.450000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffffd72778 a2=74 a3=95 items=0 ppid=2891 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.450000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:11.451000 audit: BPF prog-id=82 op=UNLOAD Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.452000 audit: BPF prog-id=83 op=LOAD Nov 1 00:15:11.452000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffffd727a8 a2=40 a3=ffffffd727d8 items=0 ppid=2891 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.452000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:11.455000 audit: BPF prog-id=83 op=UNLOAD Nov 1 00:15:11.455000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.455000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffffd728c0 a2=50 a3=0 items=0 ppid=2891 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.455000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.458000 audit: BPF prog-id=84 op=LOAD Nov 1 00:15:11.458000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff23e07f8 a2=98 a3=fffff23e07e8 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.458000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.459000 audit: BPF prog-id=84 op=UNLOAD Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit: BPF prog-id=85 op=LOAD Nov 1 00:15:11.459000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff23e0488 a2=74 a3=95 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.459000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.459000 audit: BPF prog-id=85 op=UNLOAD Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.459000 audit: BPF prog-id=86 op=LOAD Nov 1 00:15:11.459000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff23e04e8 a2=94 a3=2 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.459000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.460000 audit: BPF prog-id=86 op=UNLOAD Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.627000 audit: BPF prog-id=87 op=LOAD Nov 1 00:15:11.627000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff23e04a8 a2=40 a3=fffff23e04d8 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.628000 audit: BPF prog-id=87 op=UNLOAD Nov 1 00:15:11.628000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.628000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff23e05c0 a2=50 a3=0 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.628000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.644000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.644000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff23e0518 a2=28 a3=fffff23e0648 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.644000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.645000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.645000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff23e0548 a2=28 a3=fffff23e0678 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.645000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.645000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.645000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff23e03f8 a2=28 a3=fffff23e0528 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.645000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.645000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.645000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff23e0568 a2=28 a3=fffff23e0698 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.645000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.646000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.646000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff23e0548 a2=28 a3=fffff23e0678 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.646000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.646000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.646000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff23e0538 a2=28 a3=fffff23e0668 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.646000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.646000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.646000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff23e0568 a2=28 a3=fffff23e0698 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.646000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.647000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.647000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff23e0548 a2=28 a3=fffff23e0678 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.647000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.647000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.647000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff23e0568 a2=28 a3=fffff23e0698 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.647000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.647000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.647000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff23e0538 a2=28 a3=fffff23e0668 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.647000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff23e05b8 a2=28 a3=fffff23e06f8 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff23e02f0 a2=50 a3=0 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.648000 audit: BPF prog-id=88 op=LOAD Nov 1 00:15:11.648000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff23e02f8 a2=94 a3=5 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.650000 audit: BPF prog-id=88 op=UNLOAD Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff23e0400 a2=50 a3=0 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.650000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff23e0548 a2=4 a3=3 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.650000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.650000 audit[2982]: AVC avc: denied { confidentiality } for pid=2982 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:11.650000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff23e0528 a2=94 a3=6 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.650000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.652000 audit[2982]: AVC avc: denied { confidentiality } for pid=2982 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:11.652000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff23dfcf8 a2=94 a3=83 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.653000 audit[2982]: AVC avc: denied { confidentiality } for pid=2982 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:11.653000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff23dfcf8 a2=94 a3=83 items=0 ppid=2891 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.671000 audit: BPF prog-id=89 op=LOAD Nov 1 00:15:11.671000 audit[2985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc2a37058 a2=98 a3=ffffc2a37048 items=0 ppid=2891 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.671000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:15:11.672000 audit: BPF prog-id=89 op=UNLOAD Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.672000 audit: BPF prog-id=90 op=LOAD Nov 1 00:15:11.672000 audit[2985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc2a36f08 a2=74 a3=95 items=0 ppid=2891 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.672000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:15:11.673000 audit: BPF prog-id=90 op=UNLOAD Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.673000 audit: BPF prog-id=91 op=LOAD Nov 1 00:15:11.673000 audit[2985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc2a36f38 a2=40 a3=ffffc2a36f68 items=0 ppid=2891 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.673000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:15:11.675000 audit: BPF prog-id=91 op=UNLOAD Nov 1 00:15:11.785237 (udev-worker)[2797]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:11.788700 systemd-networkd[1528]: vxlan.calico: Link UP Nov 1 00:15:11.788709 systemd-networkd[1528]: vxlan.calico: Gained carrier Nov 1 00:15:11.843809 (udev-worker)[3003]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit: BPF prog-id=92 op=LOAD Nov 1 00:15:11.844000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd25b968 a2=98 a3=ffffdd25b958 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.844000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.844000 audit: BPF prog-id=92 op=UNLOAD Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit: BPF prog-id=93 op=LOAD Nov 1 00:15:11.844000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd25b648 a2=74 a3=95 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.844000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.844000 audit: BPF prog-id=93 op=UNLOAD Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.844000 audit: BPF prog-id=94 op=LOAD Nov 1 00:15:11.844000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd25b6a8 a2=94 a3=2 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.844000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit: BPF prog-id=94 op=UNLOAD Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd25b6d8 a2=28 a3=ffffdd25b808 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd25b708 a2=28 a3=ffffdd25b838 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd25b5b8 a2=28 a3=ffffdd25b6e8 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd25b728 a2=28 a3=ffffdd25b858 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd25b708 a2=28 a3=ffffdd25b838 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd25b6f8 a2=28 a3=ffffdd25b828 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd25b728 a2=28 a3=ffffdd25b858 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd25b708 a2=28 a3=ffffdd25b838 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd25b728 a2=28 a3=ffffdd25b858 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd25b6f8 a2=28 a3=ffffdd25b828 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd25b778 a2=28 a3=ffffdd25b8b8 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.845000 audit: BPF prog-id=95 op=LOAD Nov 1 00:15:11.845000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd25b598 a2=40 a3=ffffdd25b5c8 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.845000 audit: BPF prog-id=95 op=UNLOAD Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdd25b5c0 a2=50 a3=0 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdd25b5c0 a2=50 a3=0 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit: BPF prog-id=96 op=LOAD Nov 1 00:15:11.850000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd25ad28 a2=94 a3=2 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.850000 audit: BPF prog-id=96 op=UNLOAD Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.850000 audit: BPF prog-id=97 op=LOAD Nov 1 00:15:11.850000 audit[3011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd25aeb8 a2=94 a3=30 items=0 ppid=2891 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit: BPF prog-id=98 op=LOAD Nov 1 00:15:11.866000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde9aed28 a2=98 a3=ffffde9aed18 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:11.866000 audit: BPF prog-id=98 op=UNLOAD Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.866000 audit: BPF prog-id=99 op=LOAD Nov 1 00:15:11.866000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffde9ae9b8 a2=74 a3=95 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:11.867000 audit: BPF prog-id=99 op=UNLOAD Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit: BPF prog-id=100 op=LOAD Nov 1 00:15:11.867000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffde9aea18 a2=94 a3=2 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:11.867000 audit: BPF prog-id=100 op=UNLOAD Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.058000 audit: BPF prog-id=101 op=LOAD Nov 1 00:15:12.058000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffde9ae9d8 a2=40 a3=ffffde9aea08 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.059000 audit: BPF prog-id=101 op=UNLOAD Nov 1 00:15:12.059000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.059000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffde9aeaf0 a2=50 a3=0 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.059000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.078000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.078000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffde9aea48 a2=28 a3=ffffde9aeb78 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.078000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.078000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.078000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde9aea78 a2=28 a3=ffffde9aeba8 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.078000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde9ae928 a2=28 a3=ffffde9aea58 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffde9aea98 a2=28 a3=ffffde9aebc8 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffde9aea78 a2=28 a3=ffffde9aeba8 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffde9aea68 a2=28 a3=ffffde9aeb98 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffde9aea98 a2=28 a3=ffffde9aebc8 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde9aea78 a2=28 a3=ffffde9aeba8 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde9aea98 a2=28 a3=ffffde9aebc8 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde9aea68 a2=28 a3=ffffde9aeb98 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffde9aeae8 a2=28 a3=ffffde9aec28 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.079000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.079000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffde9ae820 a2=50 a3=0 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit: BPF prog-id=102 op=LOAD Nov 1 00:15:12.080000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffde9ae828 a2=94 a3=5 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.080000 audit: BPF prog-id=102 op=UNLOAD Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffde9ae930 a2=50 a3=0 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffde9aea78 a2=4 a3=3 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.080000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:12.080000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffde9aea58 a2=94 a3=6 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:12.081000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffde9ae228 a2=94 a3=83 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.081000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:12.081000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffde9ae228 a2=94 a3=83 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.082000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.082000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde9afc68 a2=10 a3=ffffde9afd58 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.083000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.083000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde9afb28 a2=10 a3=ffffde9afc18 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.083000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.083000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.083000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde9afa98 a2=10 a3=ffffde9afc18 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.083000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.083000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:12.083000 audit[3015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde9afa98 a2=10 a3=ffffde9afc18 items=0 ppid=2891 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.083000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:12.093000 audit: BPF prog-id=97 op=UNLOAD Nov 1 00:15:12.106011 sshd[2751]: Connection closed by authenticating user root 4.4.66.82 port 53848 [preauth] Nov 1 00:15:12.106436 systemd[1]: sshd@7-172.31.24.1:22-4.4.66.82:53848.service: Deactivated successfully. Nov 1 00:15:12.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.24.1:22-4.4.66.82:53848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:12.152129 kubelet[2201]: E1101 00:15:12.152057 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:12.204000 audit[3041]: NETFILTER_CFG table=nat:65 family=2 entries=15 op=nft_register_chain pid=3041 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:12.204000 audit[3041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffeebe73f0 a2=0 a3=ffffaf563fa8 items=0 ppid=2891 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.204000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:12.208000 audit[3042]: NETFILTER_CFG table=mangle:66 family=2 entries=16 op=nft_register_chain pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:12.208000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcdb71790 a2=0 a3=ffff84eb9fa8 items=0 ppid=2891 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.208000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:12.211000 audit[3040]: NETFILTER_CFG table=raw:67 family=2 entries=21 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:12.211000 audit[3040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffd7723950 a2=0 a3=ffff9e4d6fa8 items=0 ppid=2891 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.211000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:12.222000 audit[3048]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:12.222000 audit[3048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffde718950 a2=0 a3=ffffa73d2fa8 items=0 ppid=2891 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:12.222000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:12.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.24.1:22-4.4.66.82:60862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:12.248709 systemd[1]: Started sshd@8-172.31.24.1:22-4.4.66.82:60862.service. Nov 1 00:15:12.929941 sshd[3052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:12.930000 audit[3052]: USER_AUTH pid=3052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:12.932912 kernel: kauditd_printk_skb: 594 callbacks suppressed Nov 1 00:15:12.933034 kernel: audit: type=1100 audit(1761956112.930:677): pid=3052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:13.152382 kubelet[2201]: E1101 00:15:13.152303 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:13.530662 systemd-networkd[1528]: vxlan.calico: Gained IPv6LL Nov 1 00:15:13.658009 amazon-ssm-agent[1789]: 2025-11-01 00:15:13 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Nov 1 00:15:14.152805 kubelet[2201]: E1101 00:15:14.152761 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:14.363310 sshd[3052]: Failed password for root from 4.4.66.82 port 60862 ssh2 Nov 1 00:15:14.892160 sshd[3052]: Connection closed by authenticating user root 4.4.66.82 port 60862 [preauth] Nov 1 00:15:14.893917 systemd[1]: sshd@8-172.31.24.1:22-4.4.66.82:60862.service: Deactivated successfully. Nov 1 00:15:14.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.24.1:22-4.4.66.82:60862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:14.904518 kernel: audit: type=1131 audit(1761956114.893:678): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.24.1:22-4.4.66.82:60862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:15.024373 systemd[1]: Started sshd@9-172.31.24.1:22-4.4.66.82:37020.service. Nov 1 00:15:15.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.24.1:22-4.4.66.82:37020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:15.034514 kernel: audit: type=1130 audit(1761956115.024:679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.24.1:22-4.4.66.82:37020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:15.153984 kubelet[2201]: E1101 00:15:15.153459 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:15.367709 env[1808]: time="2025-11-01T00:15:15.367632165Z" level=info msg="StopPodSandbox for \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\"" Nov 1 00:15:15.455182 kubelet[2201]: I1101 00:15:15.455088 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vnvg9" podStartSLOduration=9.960455585 podStartE2EDuration="30.45506321s" podCreationTimestamp="2025-11-01 00:14:45 +0000 UTC" firstStartedPulling="2025-11-01 00:14:48.39913894 +0000 UTC m=+4.018783449" lastFinishedPulling="2025-11-01 00:15:08.893746577 +0000 UTC m=+24.513391074" observedRunningTime="2025-11-01 00:15:09.498015361 +0000 UTC m=+25.117659882" watchObservedRunningTime="2025-11-01 00:15:15.45506321 +0000 UTC m=+31.074707719" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.456 [INFO][3070] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.456 [INFO][3070] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" iface="eth0" netns="/var/run/netns/cni-12f987e4-f4f8-45f3-affe-4515d4af9cea" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.456 [INFO][3070] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" iface="eth0" netns="/var/run/netns/cni-12f987e4-f4f8-45f3-affe-4515d4af9cea" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.457 [INFO][3070] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" iface="eth0" netns="/var/run/netns/cni-12f987e4-f4f8-45f3-affe-4515d4af9cea" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.457 [INFO][3070] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.457 [INFO][3070] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.535 [INFO][3077] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.536 [INFO][3077] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.536 [INFO][3077] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.550 [WARNING][3077] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.550 [INFO][3077] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.552 [INFO][3077] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:15.561142 env[1808]: 2025-11-01 00:15:15.557 [INFO][3070] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:15.562409 env[1808]: time="2025-11-01T00:15:15.562355149Z" level=info msg="TearDown network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\" successfully" Nov 1 00:15:15.562628 env[1808]: time="2025-11-01T00:15:15.562591851Z" level=info msg="StopPodSandbox for \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\" returns successfully" Nov 1 00:15:15.568937 systemd[1]: run-netns-cni\x2d12f987e4\x2df4f8\x2d45f3\x2daffe\x2d4515d4af9cea.mount: Deactivated successfully. Nov 1 00:15:15.571426 env[1808]: time="2025-11-01T00:15:15.571351163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grks,Uid:36aecd38-8986-4e27-8710-f1385049c6a9,Namespace:calico-system,Attempt:1,}" Nov 1 00:15:15.698429 sshd[3059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:15.698000 audit[3059]: USER_AUTH pid=3059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:15.708524 kernel: audit: type=1100 audit(1761956115.698:680): pid=3059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:15.799222 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:15:15.799367 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d66c15488b: link becomes ready Nov 1 00:15:15.793302 systemd-networkd[1528]: cali2d66c15488b: Link UP Nov 1 00:15:15.800637 systemd-networkd[1528]: cali2d66c15488b: Gained carrier Nov 1 00:15:15.802263 (udev-worker)[3101]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.653 [INFO][3083] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.1-k8s-csi--node--driver--9grks-eth0 csi-node-driver- calico-system 36aecd38-8986-4e27-8710-f1385049c6a9 1283 0 2025-11-01 00:14:45 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.24.1 csi-node-driver-9grks eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2d66c15488b [] [] }} ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.653 [INFO][3083] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.714 [INFO][3095] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" HandleID="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.714 [INFO][3095] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" HandleID="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c2fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.24.1", "pod":"csi-node-driver-9grks", "timestamp":"2025-11-01 00:15:15.714027215 +0000 UTC"}, Hostname:"172.31.24.1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.714 [INFO][3095] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.714 [INFO][3095] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.714 [INFO][3095] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.1' Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.728 [INFO][3095] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.736 [INFO][3095] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.746 [INFO][3095] ipam/ipam.go 511: Trying affinity for 192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.749 [INFO][3095] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.759 [INFO][3095] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.759 [INFO][3095] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.127.128/26 handle="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.761 [INFO][3095] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.772 [INFO][3095] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.127.128/26 handle="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.781 [INFO][3095] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.127.129/26] block=192.168.127.128/26 handle="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.781 [INFO][3095] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.129/26] handle="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" host="172.31.24.1" Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.781 [INFO][3095] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:15.832247 env[1808]: 2025-11-01 00:15:15.781 [INFO][3095] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.127.129/26] IPv6=[] ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" HandleID="k8s-pod-network.15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.833622 env[1808]: 2025-11-01 00:15:15.784 [INFO][3083] cni-plugin/k8s.go 418: Populated endpoint ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-csi--node--driver--9grks-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"36aecd38-8986-4e27-8710-f1385049c6a9", ResourceVersion:"1283", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 14, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"", Pod:"csi-node-driver-9grks", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d66c15488b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:15.833622 env[1808]: 2025-11-01 00:15:15.785 [INFO][3083] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.129/32] ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.833622 env[1808]: 2025-11-01 00:15:15.785 [INFO][3083] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d66c15488b ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.833622 env[1808]: 2025-11-01 00:15:15.802 [INFO][3083] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.833622 env[1808]: 2025-11-01 00:15:15.805 [INFO][3083] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-csi--node--driver--9grks-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"36aecd38-8986-4e27-8710-f1385049c6a9", ResourceVersion:"1283", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 14, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a", Pod:"csi-node-driver-9grks", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d66c15488b", MAC:"6e:7c:b0:73:6b:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:15.833622 env[1808]: 2025-11-01 00:15:15.822 [INFO][3083] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a" Namespace="calico-system" Pod="csi-node-driver-9grks" WorkloadEndpoint="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:15.859055 env[1808]: time="2025-11-01T00:15:15.858915381Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:15.859251 env[1808]: time="2025-11-01T00:15:15.859066571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:15.859251 env[1808]: time="2025-11-01T00:15:15.859143179Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:15.859591 env[1808]: time="2025-11-01T00:15:15.859507987Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a pid=3120 runtime=io.containerd.runc.v2 Nov 1 00:15:15.865000 audit[3112]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:15.865000 audit[3112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffed4f760 a2=0 a3=ffff9c096fa8 items=0 ppid=2891 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:15.915336 kernel: audit: type=1325 audit(1761956115.865:681): table=filter:69 family=2 entries=38 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:15.915571 kernel: audit: type=1300 audit(1761956115.865:681): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffed4f760 a2=0 a3=ffff9c096fa8 items=0 ppid=2891 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:15.865000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:15.924987 kernel: audit: type=1327 audit(1761956115.865:681): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:15.928783 systemd[1]: Started cri-containerd-15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a.scope. Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.962503 kernel: audit: type=1400 audit(1761956115.953:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.962631 kernel: audit: type=1400 audit(1761956115.953:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.979589 kernel: audit: type=1400 audit(1761956115.953:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.960000 audit: BPF prog-id=103 op=LOAD Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:15.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656138656662393031393533616632323932613064323962333066 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:15.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656138656662393031393533616632323932613064323962333066 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.961000 audit: BPF prog-id=104 op=LOAD Nov 1 00:15:15.961000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:15.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656138656662393031393533616632323932613064323962333066 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.969000 audit: BPF prog-id=105 op=LOAD Nov 1 00:15:15.969000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:15.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656138656662393031393533616632323932613064323962333066 Nov 1 00:15:15.977000 audit: BPF prog-id=105 op=UNLOAD Nov 1 00:15:15.977000 audit: BPF prog-id=104 op=UNLOAD Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:15.977000 audit: BPF prog-id=106 op=LOAD Nov 1 00:15:15.977000 audit[3131]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:15.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656138656662393031393533616632323932613064323962333066 Nov 1 00:15:16.005232 env[1808]: time="2025-11-01T00:15:16.005176661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9grks,Uid:36aecd38-8986-4e27-8710-f1385049c6a9,Namespace:calico-system,Attempt:1,} returns sandbox id \"15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a\"" Nov 1 00:15:16.008392 env[1808]: time="2025-11-01T00:15:16.008344940Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:15:16.154901 kubelet[2201]: E1101 00:15:16.153632 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:16.270662 env[1808]: time="2025-11-01T00:15:16.270600257Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:16.272039 env[1808]: time="2025-11-01T00:15:16.271931309Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:15:16.272961 kubelet[2201]: E1101 00:15:16.272416 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:16.272961 kubelet[2201]: E1101 00:15:16.272519 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:16.273202 kubelet[2201]: E1101 00:15:16.272862 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:16.275995 env[1808]: time="2025-11-01T00:15:16.275925641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:15:16.404528 update_engine[1804]: I1101 00:15:16.404399 1804 update_attempter.cc:509] Updating boot flags... Nov 1 00:15:16.530976 env[1808]: time="2025-11-01T00:15:16.530889414Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:16.532092 env[1808]: time="2025-11-01T00:15:16.531992448Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:15:16.533590 kubelet[2201]: E1101 00:15:16.532345 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:16.533590 kubelet[2201]: E1101 00:15:16.532417 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:16.533590 kubelet[2201]: E1101 00:15:16.532600 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:16.534241 kubelet[2201]: E1101 00:15:16.534141 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:15:16.568941 systemd[1]: run-containerd-runc-k8s.io-15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a-runc.zVOX2x.mount: Deactivated successfully. Nov 1 00:15:17.154660 kubelet[2201]: E1101 00:15:17.154574 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:17.434723 systemd-networkd[1528]: cali2d66c15488b: Gained IPv6LL Nov 1 00:15:17.473076 kubelet[2201]: E1101 00:15:17.472968 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:15:18.155074 kubelet[2201]: E1101 00:15:18.154998 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:18.210366 sshd[3059]: Failed password for root from 4.4.66.82 port 37020 ssh2 Nov 1 00:15:19.156272 kubelet[2201]: E1101 00:15:19.156198 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:19.367838 env[1808]: time="2025-11-01T00:15:19.367731102Z" level=info msg="StopPodSandbox for \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\"" Nov 1 00:15:19.494590 sshd[3059]: Connection closed by authenticating user root 4.4.66.82 port 37020 [preauth] Nov 1 00:15:19.497363 systemd[1]: sshd@9-172.31.24.1:22-4.4.66.82:37020.service: Deactivated successfully. Nov 1 00:15:19.500585 kernel: kauditd_printk_skb: 54 callbacks suppressed Nov 1 00:15:19.500662 kernel: audit: type=1131 audit(1761956119.497:700): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.24.1:22-4.4.66.82:37020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:19.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.24.1:22-4.4.66.82:37020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.441 [INFO][3351] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.441 [INFO][3351] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" iface="eth0" netns="/var/run/netns/cni-6e2ce7f0-f589-7ec8-8169-25abae05543d" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.441 [INFO][3351] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" iface="eth0" netns="/var/run/netns/cni-6e2ce7f0-f589-7ec8-8169-25abae05543d" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.441 [INFO][3351] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" iface="eth0" netns="/var/run/netns/cni-6e2ce7f0-f589-7ec8-8169-25abae05543d" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.442 [INFO][3351] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.442 [INFO][3351] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.487 [INFO][3358] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.488 [INFO][3358] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.488 [INFO][3358] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.511 [WARNING][3358] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.511 [INFO][3358] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.514 [INFO][3358] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:19.519726 env[1808]: 2025-11-01 00:15:19.516 [INFO][3351] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:19.524715 env[1808]: time="2025-11-01T00:15:19.523178998Z" level=info msg="TearDown network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\" successfully" Nov 1 00:15:19.524715 env[1808]: time="2025-11-01T00:15:19.523249562Z" level=info msg="StopPodSandbox for \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\" returns successfully" Nov 1 00:15:19.523091 systemd[1]: run-netns-cni\x2d6e2ce7f0\x2df589\x2d7ec8\x2d8169\x2d25abae05543d.mount: Deactivated successfully. Nov 1 00:15:19.525712 env[1808]: time="2025-11-01T00:15:19.525660489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rsx29,Uid:88b0b19f-3e1c-493e-90b0-a78bb677c316,Namespace:default,Attempt:1,}" Nov 1 00:15:19.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.24.1:22-4.4.66.82:44200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:19.637986 systemd[1]: Started sshd@10-172.31.24.1:22-4.4.66.82:44200.service. Nov 1 00:15:19.652534 kernel: audit: type=1130 audit(1761956119.636:701): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.24.1:22-4.4.66.82:44200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:19.754698 (udev-worker)[3169]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:19.760649 systemd-networkd[1528]: calic5e0b8e4904: Link UP Nov 1 00:15:19.762558 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:15:19.762727 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic5e0b8e4904: link becomes ready Nov 1 00:15:19.763220 systemd-networkd[1528]: calic5e0b8e4904: Gained carrier Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.609 [INFO][3365] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0 nginx-deployment-7fcdb87857- default 88b0b19f-3e1c-493e-90b0-a78bb677c316 1320 0 2025-11-01 00:15:03 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.24.1 nginx-deployment-7fcdb87857-rsx29 eth0 default [] [] [kns.default ksa.default.default] calic5e0b8e4904 [] [] }} ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.616 [INFO][3365] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.676 [INFO][3378] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" HandleID="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.677 [INFO][3378] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" HandleID="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400032b810), Attrs:map[string]string{"namespace":"default", "node":"172.31.24.1", "pod":"nginx-deployment-7fcdb87857-rsx29", "timestamp":"2025-11-01 00:15:19.676937617 +0000 UTC"}, Hostname:"172.31.24.1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.677 [INFO][3378] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.677 [INFO][3378] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.677 [INFO][3378] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.1' Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.697 [INFO][3378] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.705 [INFO][3378] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.713 [INFO][3378] ipam/ipam.go 511: Trying affinity for 192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.716 [INFO][3378] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.721 [INFO][3378] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.721 [INFO][3378] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.127.128/26 handle="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.724 [INFO][3378] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30 Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.733 [INFO][3378] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.127.128/26 handle="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.742 [INFO][3378] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.127.130/26] block=192.168.127.128/26 handle="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.743 [INFO][3378] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.130/26] handle="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" host="172.31.24.1" Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.743 [INFO][3378] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:19.787506 env[1808]: 2025-11-01 00:15:19.743 [INFO][3378] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.127.130/26] IPv6=[] ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" HandleID="k8s-pod-network.75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.788759 env[1808]: 2025-11-01 00:15:19.746 [INFO][3365] cni-plugin/k8s.go 418: Populated endpoint ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"88b0b19f-3e1c-493e-90b0-a78bb677c316", ResourceVersion:"1320", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-rsx29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic5e0b8e4904", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:19.788759 env[1808]: 2025-11-01 00:15:19.746 [INFO][3365] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.130/32] ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.788759 env[1808]: 2025-11-01 00:15:19.746 [INFO][3365] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic5e0b8e4904 ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.788759 env[1808]: 2025-11-01 00:15:19.764 [INFO][3365] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.788759 env[1808]: 2025-11-01 00:15:19.765 [INFO][3365] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"88b0b19f-3e1c-493e-90b0-a78bb677c316", ResourceVersion:"1320", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30", Pod:"nginx-deployment-7fcdb87857-rsx29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic5e0b8e4904", MAC:"be:06:0c:98:06:9f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:19.788759 env[1808]: 2025-11-01 00:15:19.777 [INFO][3365] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30" Namespace="default" Pod="nginx-deployment-7fcdb87857-rsx29" WorkloadEndpoint="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:19.811716 env[1808]: time="2025-11-01T00:15:19.811326340Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:19.811716 env[1808]: time="2025-11-01T00:15:19.811406650Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:19.811716 env[1808]: time="2025-11-01T00:15:19.811433192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:19.811978 env[1808]: time="2025-11-01T00:15:19.811782700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30 pid=3403 runtime=io.containerd.runc.v2 Nov 1 00:15:19.830000 audit[3414]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=3414 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:19.830000 audit[3414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffc37fb2d0 a2=0 a3=ffff8adb1fa8 items=0 ppid=2891 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:19.850730 kernel: audit: type=1325 audit(1761956119.830:702): table=filter:70 family=2 entries=42 op=nft_register_chain pid=3414 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:19.850969 kernel: audit: type=1300 audit(1761956119.830:702): arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffc37fb2d0 a2=0 a3=ffff8adb1fa8 items=0 ppid=2891 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:19.830000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:19.870007 kernel: audit: type=1327 audit(1761956119.830:702): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:19.877358 systemd[1]: Started cri-containerd-75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30.scope. Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.923206 kernel: audit: type=1400 audit(1761956119.906:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.923271 kernel: audit: type=1400 audit(1761956119.906:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.930933 kernel: audit: type=1400 audit(1761956119.906:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.938807 kernel: audit: type=1400 audit(1761956119.906:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.939344 kernel: audit: type=1400 audit(1761956119.906:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.906000 audit: BPF prog-id=107 op=LOAD Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3403 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:19.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643263313933663733343539333033666430663666646263653066 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3403 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:19.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643263313933663733343539333033666430663666646263653066 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.912000 audit: BPF prog-id=108 op=LOAD Nov 1 00:15:19.912000 audit[3413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3403 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:19.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643263313933663733343539333033666430663666646263653066 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.914000 audit: BPF prog-id=109 op=LOAD Nov 1 00:15:19.914000 audit[3413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3403 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:19.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643263313933663733343539333033666430663666646263653066 Nov 1 00:15:19.921000 audit: BPF prog-id=109 op=UNLOAD Nov 1 00:15:19.922000 audit: BPF prog-id=108 op=UNLOAD Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:19.922000 audit: BPF prog-id=110 op=LOAD Nov 1 00:15:19.922000 audit[3413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3403 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:19.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643263313933663733343539333033666430663666646263653066 Nov 1 00:15:19.993010 env[1808]: time="2025-11-01T00:15:19.992949385Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-rsx29,Uid:88b0b19f-3e1c-493e-90b0-a78bb677c316,Namespace:default,Attempt:1,} returns sandbox id \"75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30\"" Nov 1 00:15:19.996024 env[1808]: time="2025-11-01T00:15:19.995973743Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:15:20.157341 kubelet[2201]: E1101 00:15:20.157185 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:20.353000 audit[3384]: USER_AUTH pid=3384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:20.354040 sshd[3384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:21.158464 kubelet[2201]: E1101 00:15:21.158392 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:21.210850 systemd-networkd[1528]: calic5e0b8e4904: Gained IPv6LL Nov 1 00:15:22.159010 kubelet[2201]: E1101 00:15:22.158946 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:22.219073 sshd[3384]: Failed password for root from 4.4.66.82 port 44200 ssh2 Nov 1 00:15:23.159906 kubelet[2201]: E1101 00:15:23.159787 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:23.392401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount389028372.mount: Deactivated successfully. Nov 1 00:15:24.157537 sshd[3384]: Connection closed by authenticating user root 4.4.66.82 port 44200 [preauth] Nov 1 00:15:24.160446 systemd[1]: sshd@10-172.31.24.1:22-4.4.66.82:44200.service: Deactivated successfully. Nov 1 00:15:24.161009 kubelet[2201]: E1101 00:15:24.160838 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:24.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.24.1:22-4.4.66.82:44200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:24.297464 systemd[1]: Started sshd@11-172.31.24.1:22-4.4.66.82:51276.service. Nov 1 00:15:24.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.24.1:22-4.4.66.82:51276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:24.996755 sshd[3449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:24.995000 audit[3449]: ANOM_LOGIN_FAILURES pid=3449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:24.996977 sshd[3449]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Nov 1 00:15:24.999110 kernel: kauditd_printk_skb: 55 callbacks suppressed Nov 1 00:15:24.999209 kernel: audit: type=2100 audit(1761956124.995:724): pid=3449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:24.995000 audit[3449]: USER_AUTH pid=3449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:25.015106 kernel: audit: type=1100 audit(1761956124.995:725): pid=3449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:25.132008 kubelet[2201]: E1101 00:15:25.131943 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:25.162022 kubelet[2201]: E1101 00:15:25.161953 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:25.669047 env[1808]: time="2025-11-01T00:15:25.668958818Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:25.671818 env[1808]: time="2025-11-01T00:15:25.671732251Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:25.675583 env[1808]: time="2025-11-01T00:15:25.675532686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:25.679607 env[1808]: time="2025-11-01T00:15:25.679536327Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:25.683574 env[1808]: time="2025-11-01T00:15:25.682045730Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Nov 1 00:15:25.687642 env[1808]: time="2025-11-01T00:15:25.687588879Z" level=info msg="CreateContainer within sandbox \"75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Nov 1 00:15:25.707416 env[1808]: time="2025-11-01T00:15:25.707307054Z" level=info msg="CreateContainer within sandbox \"75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"a9aaa4d0fe64c1484113935dcc53a4a7466b54b43de07e857b591aec99bb4947\"" Nov 1 00:15:25.708399 env[1808]: time="2025-11-01T00:15:25.708299219Z" level=info msg="StartContainer for \"a9aaa4d0fe64c1484113935dcc53a4a7466b54b43de07e857b591aec99bb4947\"" Nov 1 00:15:25.755618 systemd[1]: run-containerd-runc-k8s.io-a9aaa4d0fe64c1484113935dcc53a4a7466b54b43de07e857b591aec99bb4947-runc.f38bn6.mount: Deactivated successfully. Nov 1 00:15:25.761895 systemd[1]: Started cri-containerd-a9aaa4d0fe64c1484113935dcc53a4a7466b54b43de07e857b591aec99bb4947.scope. Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.806504 kernel: audit: type=1400 audit(1761956125.797:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.806576 kernel: audit: type=1400 audit(1761956125.797:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.823024 kernel: audit: type=1400 audit(1761956125.797:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.823122 kernel: audit: type=1400 audit(1761956125.797:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838295 kernel: audit: type=1400 audit(1761956125.797:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838387 kernel: audit: type=1400 audit(1761956125.797:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.853641 kernel: audit: type=1400 audit(1761956125.797:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.861967 kernel: audit: type=1400 audit(1761956125.797:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.805000 audit: BPF prog-id=111 op=LOAD Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3403 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139616161346430666536346331343834313133393335646363353361 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3403 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139616161346430666536346331343834313133393335646363353361 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.812000 audit: BPF prog-id=112 op=LOAD Nov 1 00:15:25.812000 audit[3460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3403 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139616161346430666536346331343834313133393335646363353361 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit: BPF prog-id=113 op=LOAD Nov 1 00:15:25.813000 audit[3460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3403 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139616161346430666536346331343834313133393335646363353361 Nov 1 00:15:25.813000 audit: BPF prog-id=113 op=UNLOAD Nov 1 00:15:25.813000 audit: BPF prog-id=112 op=UNLOAD Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.813000 audit: BPF prog-id=114 op=LOAD Nov 1 00:15:25.813000 audit[3460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3403 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139616161346430666536346331343834313133393335646363353361 Nov 1 00:15:25.887241 env[1808]: time="2025-11-01T00:15:25.887179526Z" level=info msg="StartContainer for \"a9aaa4d0fe64c1484113935dcc53a4a7466b54b43de07e857b591aec99bb4947\" returns successfully" Nov 1 00:15:26.162976 kubelet[2201]: E1101 00:15:26.162793 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:26.408724 sshd[3449]: Failed password for root from 4.4.66.82 port 51276 ssh2 Nov 1 00:15:26.516199 kubelet[2201]: I1101 00:15:26.516088 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-rsx29" podStartSLOduration=17.826568516000002 podStartE2EDuration="23.516066249s" podCreationTimestamp="2025-11-01 00:15:03 +0000 UTC" firstStartedPulling="2025-11-01 00:15:19.995334789 +0000 UTC m=+35.614979298" lastFinishedPulling="2025-11-01 00:15:25.684832534 +0000 UTC m=+41.304477031" observedRunningTime="2025-11-01 00:15:26.515374613 +0000 UTC m=+42.135019146" watchObservedRunningTime="2025-11-01 00:15:26.516066249 +0000 UTC m=+42.135710734" Nov 1 00:15:26.963597 sshd[3449]: Connection closed by authenticating user root 4.4.66.82 port 51276 [preauth] Nov 1 00:15:26.966220 systemd[1]: sshd@11-172.31.24.1:22-4.4.66.82:51276.service: Deactivated successfully. Nov 1 00:15:26.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.24.1:22-4.4.66.82:51276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:27.099742 systemd[1]: Started sshd@12-172.31.24.1:22-4.4.66.82:55714.service. Nov 1 00:15:27.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.24.1:22-4.4.66.82:55714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:27.163666 kubelet[2201]: E1101 00:15:27.163573 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:27.786571 sshd[3511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:27.785000 audit[3511]: USER_AUTH pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:28.164689 kubelet[2201]: E1101 00:15:28.164518 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:29.164757 kubelet[2201]: E1101 00:15:29.164683 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:29.368823 env[1808]: time="2025-11-01T00:15:29.368460437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:15:29.607395 env[1808]: time="2025-11-01T00:15:29.607328543Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:29.609038 env[1808]: time="2025-11-01T00:15:29.608971034Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:15:29.609515 kubelet[2201]: E1101 00:15:29.609442 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:29.609675 kubelet[2201]: E1101 00:15:29.609529 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:29.609811 kubelet[2201]: E1101 00:15:29.609738 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:29.612688 env[1808]: time="2025-11-01T00:15:29.612638188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:15:29.886022 env[1808]: time="2025-11-01T00:15:29.885836870Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:29.887902 env[1808]: time="2025-11-01T00:15:29.887780923Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:15:29.888352 kubelet[2201]: E1101 00:15:29.888283 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:29.888516 kubelet[2201]: E1101 00:15:29.888356 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:29.888607 kubelet[2201]: E1101 00:15:29.888551 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:29.890644 kubelet[2201]: E1101 00:15:29.890535 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:15:29.947394 sshd[3511]: Failed password for root from 4.4.66.82 port 55714 ssh2 Nov 1 00:15:30.166099 kubelet[2201]: E1101 00:15:30.165637 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:31.166848 kubelet[2201]: E1101 00:15:31.166774 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:31.585629 sshd[3511]: Connection closed by authenticating user root 4.4.66.82 port 55714 [preauth] Nov 1 00:15:31.588258 systemd[1]: sshd@12-172.31.24.1:22-4.4.66.82:55714.service: Deactivated successfully. Nov 1 00:15:31.590798 kernel: kauditd_printk_skb: 52 callbacks suppressed Nov 1 00:15:31.590884 kernel: audit: type=1131 audit(1761956131.587:747): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.24.1:22-4.4.66.82:55714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:31.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.24.1:22-4.4.66.82:55714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:31.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.24.1:22-4.4.66.82:34576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:31.719124 systemd[1]: Started sshd@13-172.31.24.1:22-4.4.66.82:34576.service. Nov 1 00:15:31.730551 kernel: audit: type=1130 audit(1761956131.717:748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.24.1:22-4.4.66.82:34576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:32.167233 kubelet[2201]: E1101 00:15:32.167157 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:32.383953 sshd[3517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:32.382000 audit[3517]: USER_AUTH pid=3517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:32.393559 kernel: audit: type=1100 audit(1761956132.382:749): pid=3517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:33.167617 kubelet[2201]: E1101 00:15:33.167543 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:33.627000 audit[3526]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=3526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:33.627000 audit[3526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffc8120790 a2=0 a3=1 items=0 ppid=2356 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:33.647467 kernel: audit: type=1325 audit(1761956133.627:750): table=filter:71 family=2 entries=26 op=nft_register_rule pid=3526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:33.647666 kernel: audit: type=1300 audit(1761956133.627:750): arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffc8120790 a2=0 a3=1 items=0 ppid=2356 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:33.647731 kernel: audit: type=1327 audit(1761956133.627:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:33.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:33.648000 audit[3526]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=3526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:33.658971 kernel: audit: type=1325 audit(1761956133.648:751): table=nat:72 family=2 entries=20 op=nft_register_rule pid=3526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:33.659108 kernel: audit: type=1300 audit(1761956133.648:751): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc8120790 a2=0 a3=1 items=0 ppid=2356 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:33.648000 audit[3526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc8120790 a2=0 a3=1 items=0 ppid=2356 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:33.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:33.676111 kernel: audit: type=1327 audit(1761956133.648:751): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:33.685000 audit[3528]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=3528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:33.685000 audit[3528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffd8dd6040 a2=0 a3=1 items=0 ppid=2356 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:33.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:33.694647 kernel: audit: type=1325 audit(1761956133.685:752): table=filter:73 family=2 entries=38 op=nft_register_rule pid=3528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:33.694000 audit[3528]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=3528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:33.694000 audit[3528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd8dd6040 a2=0 a3=1 items=0 ppid=2356 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:33.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:33.723674 systemd[1]: Created slice kubepods-besteffort-podad576ed8_f747_4779_bad0_c9c98e75fbed.slice. Nov 1 00:15:33.911615 kubelet[2201]: I1101 00:15:33.910670 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ad576ed8-f747-4779-bad0-c9c98e75fbed-data\") pod \"nfs-server-provisioner-0\" (UID: \"ad576ed8-f747-4779-bad0-c9c98e75fbed\") " pod="default/nfs-server-provisioner-0" Nov 1 00:15:33.911615 kubelet[2201]: I1101 00:15:33.910748 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-98t42\" (UniqueName: \"kubernetes.io/projected/ad576ed8-f747-4779-bad0-c9c98e75fbed-kube-api-access-98t42\") pod \"nfs-server-provisioner-0\" (UID: \"ad576ed8-f747-4779-bad0-c9c98e75fbed\") " pod="default/nfs-server-provisioner-0" Nov 1 00:15:34.167780 kubelet[2201]: E1101 00:15:34.167731 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:34.228376 sshd[3517]: Failed password for root from 4.4.66.82 port 34576 ssh2 Nov 1 00:15:34.330921 env[1808]: time="2025-11-01T00:15:34.330840429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ad576ed8-f747-4779-bad0-c9c98e75fbed,Namespace:default,Attempt:0,}" Nov 1 00:15:34.538186 systemd-networkd[1528]: cali60e51b789ff: Link UP Nov 1 00:15:34.545762 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:15:34.545886 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Nov 1 00:15:34.546555 systemd-networkd[1528]: cali60e51b789ff: Gained carrier Nov 1 00:15:34.547316 (udev-worker)[3551]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.416 [INFO][3531] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.1-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ad576ed8-f747-4779-bad0-c9c98e75fbed 1412 0 2025-11-01 00:15:33 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.24.1 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.416 [INFO][3531] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.462 [INFO][3544] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" HandleID="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Workload="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.463 [INFO][3544] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" HandleID="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Workload="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d37c0), Attrs:map[string]string{"namespace":"default", "node":"172.31.24.1", "pod":"nfs-server-provisioner-0", "timestamp":"2025-11-01 00:15:34.462646806 +0000 UTC"}, Hostname:"172.31.24.1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.463 [INFO][3544] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.463 [INFO][3544] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.463 [INFO][3544] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.1' Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.482 [INFO][3544] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.491 [INFO][3544] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.499 [INFO][3544] ipam/ipam.go 511: Trying affinity for 192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.502 [INFO][3544] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.505 [INFO][3544] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.505 [INFO][3544] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.127.128/26 handle="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.507 [INFO][3544] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423 Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.514 [INFO][3544] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.127.128/26 handle="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.528 [INFO][3544] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.127.131/26] block=192.168.127.128/26 handle="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.528 [INFO][3544] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.131/26] handle="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" host="172.31.24.1" Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.529 [INFO][3544] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:34.572036 env[1808]: 2025-11-01 00:15:34.529 [INFO][3544] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.127.131/26] IPv6=[] ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" HandleID="k8s-pod-network.0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Workload="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:34.573315 env[1808]: 2025-11-01 00:15:34.532 [INFO][3531] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ad576ed8-f747-4779-bad0-c9c98e75fbed", ResourceVersion:"1412", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.127.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:34.573315 env[1808]: 2025-11-01 00:15:34.532 [INFO][3531] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.131/32] ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:34.573315 env[1808]: 2025-11-01 00:15:34.532 [INFO][3531] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:34.573315 env[1808]: 2025-11-01 00:15:34.549 [INFO][3531] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:34.573700 env[1808]: 2025-11-01 00:15:34.549 [INFO][3531] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ad576ed8-f747-4779-bad0-c9c98e75fbed", ResourceVersion:"1412", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.127.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ee:a1:d6:3a:c2:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:34.573700 env[1808]: 2025-11-01 00:15:34.566 [INFO][3531] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.1-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:34.593000 audit[3564]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=3564 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:34.593000 audit[3564]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffc3fc7e20 a2=0 a3=ffff8e070fa8 items=0 ppid=2891 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:34.593000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:34.597206 env[1808]: time="2025-11-01T00:15:34.597071457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:34.597563 env[1808]: time="2025-11-01T00:15:34.597506236Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:34.597729 env[1808]: time="2025-11-01T00:15:34.597684755Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:34.598210 env[1808]: time="2025-11-01T00:15:34.598077538Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423 pid=3569 runtime=io.containerd.runc.v2 Nov 1 00:15:34.638824 systemd[1]: Started cri-containerd-0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423.scope. Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.679000 audit: BPF prog-id=115 op=LOAD Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3569 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:34.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373961336632373832626239643831346264306134386139353039 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3569 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:34.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373961336632373832626239643831346264306134386139353039 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.680000 audit: BPF prog-id=116 op=LOAD Nov 1 00:15:34.680000 audit[3578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3569 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:34.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373961336632373832626239643831346264306134386139353039 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit: BPF prog-id=117 op=LOAD Nov 1 00:15:34.681000 audit[3578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3569 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:34.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373961336632373832626239643831346264306134386139353039 Nov 1 00:15:34.681000 audit: BPF prog-id=117 op=UNLOAD Nov 1 00:15:34.681000 audit: BPF prog-id=116 op=UNLOAD Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:34.681000 audit: BPF prog-id=118 op=LOAD Nov 1 00:15:34.681000 audit[3578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3569 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:34.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373961336632373832626239643831346264306134386139353039 Nov 1 00:15:34.726451 env[1808]: time="2025-11-01T00:15:34.726390924Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ad576ed8-f747-4779-bad0-c9c98e75fbed,Namespace:default,Attempt:0,} returns sandbox id \"0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423\"" Nov 1 00:15:34.729525 env[1808]: time="2025-11-01T00:15:34.729422937Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Nov 1 00:15:35.050203 systemd[1]: run-containerd-runc-k8s.io-0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423-runc.cyZUAR.mount: Deactivated successfully. Nov 1 00:15:35.169036 kubelet[2201]: E1101 00:15:35.168985 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:35.675289 systemd-networkd[1528]: cali60e51b789ff: Gained IPv6LL Nov 1 00:15:36.170151 kubelet[2201]: E1101 00:15:36.170058 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:36.178728 sshd[3517]: Connection closed by authenticating user root 4.4.66.82 port 34576 [preauth] Nov 1 00:15:36.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.24.1:22-4.4.66.82:34576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:36.182093 systemd[1]: sshd@13-172.31.24.1:22-4.4.66.82:34576.service: Deactivated successfully. Nov 1 00:15:36.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.24.1:22-4.4.66.82:41598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:36.306746 systemd[1]: Started sshd@14-172.31.24.1:22-4.4.66.82:41598.service. Nov 1 00:15:36.960658 sshd[3604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:36.959000 audit[3604]: USER_AUTH pid=3604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:36.963072 kernel: kauditd_printk_skb: 67 callbacks suppressed Nov 1 00:15:36.963167 kernel: audit: type=1100 audit(1761956136.959:775): pid=3604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:37.170577 kubelet[2201]: E1101 00:15:37.170519 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:38.020118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount893327407.mount: Deactivated successfully. Nov 1 00:15:38.171334 kubelet[2201]: E1101 00:15:38.171124 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:38.364556 sshd[3604]: Failed password for root from 4.4.66.82 port 41598 ssh2 Nov 1 00:15:38.919516 sshd[3604]: Connection closed by authenticating user root 4.4.66.82 port 41598 [preauth] Nov 1 00:15:38.920534 systemd[1]: sshd@14-172.31.24.1:22-4.4.66.82:41598.service: Deactivated successfully. Nov 1 00:15:38.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.24.1:22-4.4.66.82:41598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:38.936507 kernel: audit: type=1131 audit(1761956138.920:776): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.24.1:22-4.4.66.82:41598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:39.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.24.1:22-4.4.66.82:45966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:39.051976 systemd[1]: Started sshd@15-172.31.24.1:22-4.4.66.82:45966.service. Nov 1 00:15:39.064574 kernel: audit: type=1130 audit(1761956139.051:777): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.24.1:22-4.4.66.82:45966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:39.172063 kubelet[2201]: E1101 00:15:39.171582 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:39.730101 sshd[3608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:39.728000 audit[3608]: USER_AUTH pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:39.740556 kernel: audit: type=1100 audit(1761956139.728:778): pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:40.171957 kubelet[2201]: E1101 00:15:40.171886 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:40.493921 systemd[1]: run-containerd-runc-k8s.io-9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68-runc.5t4Zpy.mount: Deactivated successfully. Nov 1 00:15:41.173121 kubelet[2201]: E1101 00:15:41.173043 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:41.372050 kubelet[2201]: E1101 00:15:41.371990 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:15:41.687725 env[1808]: time="2025-11-01T00:15:41.687665238Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:41.690728 env[1808]: time="2025-11-01T00:15:41.690658906Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:41.694150 env[1808]: time="2025-11-01T00:15:41.694086801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:41.697388 env[1808]: time="2025-11-01T00:15:41.697323700Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:41.699319 env[1808]: time="2025-11-01T00:15:41.699267484Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Nov 1 00:15:41.706544 env[1808]: time="2025-11-01T00:15:41.706458834Z" level=info msg="CreateContainer within sandbox \"0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Nov 1 00:15:41.729290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3308827090.mount: Deactivated successfully. Nov 1 00:15:41.744221 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3654819766.mount: Deactivated successfully. Nov 1 00:15:41.747946 env[1808]: time="2025-11-01T00:15:41.747886228Z" level=info msg="CreateContainer within sandbox \"0479a3f2782bb9d814bd0a48a95098c8dc69fbbd357ba2372719251833ce4423\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0e9c8bf60249bc32ac97bd2a66aabd0ec5ac76f9b1ef00c9f46fdbc3c0ec3f5b\"" Nov 1 00:15:41.749091 env[1808]: time="2025-11-01T00:15:41.749045120Z" level=info msg="StartContainer for \"0e9c8bf60249bc32ac97bd2a66aabd0ec5ac76f9b1ef00c9f46fdbc3c0ec3f5b\"" Nov 1 00:15:41.791037 systemd[1]: Started cri-containerd-0e9c8bf60249bc32ac97bd2a66aabd0ec5ac76f9b1ef00c9f46fdbc3c0ec3f5b.scope. Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845883 kernel: audit: type=1400 audit(1761956141.829:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.846134 kernel: audit: type=1400 audit(1761956141.829:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.853799 kernel: audit: type=1400 audit(1761956141.829:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.862163 kernel: audit: type=1400 audit(1761956141.829:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.870811 kernel: audit: type=1400 audit(1761956141.829:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.870917 sshd[3608]: Failed password for root from 4.4.66.82 port 45966 ssh2 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.879918 kernel: audit: type=1400 audit(1761956141.829:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit: BPF prog-id=119 op=LOAD Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3569 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:41.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396338626636303234396263333261633937626432613636616162 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3569 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:41.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396338626636303234396263333261633937626432613636616162 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.837000 audit: BPF prog-id=120 op=LOAD Nov 1 00:15:41.837000 audit[3644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3569 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:41.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396338626636303234396263333261633937626432613636616162 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit: BPF prog-id=121 op=LOAD Nov 1 00:15:41.845000 audit[3644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3569 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:41.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396338626636303234396263333261633937626432613636616162 Nov 1 00:15:41.845000 audit: BPF prog-id=121 op=UNLOAD Nov 1 00:15:41.845000 audit: BPF prog-id=120 op=UNLOAD Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:41.845000 audit: BPF prog-id=122 op=LOAD Nov 1 00:15:41.845000 audit[3644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3569 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:41.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396338626636303234396263333261633937626432613636616162 Nov 1 00:15:41.904497 env[1808]: time="2025-11-01T00:15:41.904301768Z" level=info msg="StartContainer for \"0e9c8bf60249bc32ac97bd2a66aabd0ec5ac76f9b1ef00c9f46fdbc3c0ec3f5b\" returns successfully" Nov 1 00:15:42.042087 kernel: kauditd_printk_skb: 51 callbacks suppressed Nov 1 00:15:42.042247 kernel: audit: type=1400 audit(1761956142.030:797): avc: denied { search } for pid=3671 comm="rpcbind" name="crypto" dev="proc" ino=19635 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:42.030000 audit[3671]: AVC avc: denied { search } for pid=3671 comm="rpcbind" name="crypto" dev="proc" ino=19635 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:42.030000 audit[3671]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8e9ff000 a2=0 a3=0 items=0 ppid=3654 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.030000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Nov 1 00:15:42.062104 kernel: audit: type=1300 audit(1761956142.030:797): arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8e9ff000 a2=0 a3=0 items=0 ppid=3654 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.062239 kernel: audit: type=1327 audit(1761956142.030:797): proctitle=2F7573722F7362696E2F72706362696E64002D77 Nov 1 00:15:42.119000 audit[3676]: AVC avc: denied { search } for pid=3676 comm="dbus-daemon" name="crypto" dev="proc" ino=19635 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:42.119000 audit[3676]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9c50f000 a2=0 a3=0 items=0 ppid=3654 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.141543 kernel: audit: type=1400 audit(1761956142.119:798): avc: denied { search } for pid=3676 comm="dbus-daemon" name="crypto" dev="proc" ino=19635 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:42.141667 kernel: audit: type=1300 audit(1761956142.119:798): arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9c50f000 a2=0 a3=0 items=0 ppid=3654 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.119000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:15:42.146221 kernel: audit: type=1327 audit(1761956142.119:798): proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:15:42.128000 audit[3677]: AVC avc: denied { watch } for pid=3677 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c231,c378 tclass=dir permissive=0 Nov 1 00:15:42.128000 audit[3677]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf0e69fb0 a2=2c8 a3=aaaaf0e4fa60 items=0 ppid=3654 pid=3677 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.169447 kernel: audit: type=1400 audit(1761956142.128:799): avc: denied { watch } for pid=3677 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c231,c378 tclass=dir permissive=0 Nov 1 00:15:42.169602 kernel: audit: type=1300 audit(1761956142.128:799): arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf0e69fb0 a2=2c8 a3=aaaaf0e4fa60 items=0 ppid=3654 pid=3677 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.169657 kernel: audit: type=1327 audit(1761956142.128:799): proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:15:42.128000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:15:42.173923 kernel: audit: type=1400 audit(1761956142.152:800): avc: denied { read } for pid=3678 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=19676 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Nov 1 00:15:42.152000 audit[3678]: AVC avc: denied { read } for pid=3678 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=19676 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Nov 1 00:15:42.174230 kubelet[2201]: E1101 00:15:42.173795 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:42.152000 audit[3678]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffacd6a570 a2=80000 a3=0 items=0 ppid=3654 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.152000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:15:42.152000 audit[3678]: AVC avc: denied { search } for pid=3678 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19635 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:42.152000 audit[3678]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffac0ff000 a2=0 a3=0 items=0 ppid=3654 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c378 key=(null) Nov 1 00:15:42.152000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:15:42.598000 audit[3683]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:42.598000 audit[3683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffef0b2040 a2=0 a3=1 items=0 ppid=2356 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:42.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:42.606000 audit[3683]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:42.606000 audit[3683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffef0b2040 a2=0 a3=1 items=0 ppid=2356 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:42.606000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:43.175346 kubelet[2201]: E1101 00:15:43.175293 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:43.527421 sshd[3608]: Connection closed by authenticating user root 4.4.66.82 port 45966 [preauth] Nov 1 00:15:43.529541 systemd[1]: sshd@15-172.31.24.1:22-4.4.66.82:45966.service: Deactivated successfully. Nov 1 00:15:43.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.24.1:22-4.4.66.82:45966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:43.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.24.1:22-4.4.66.82:53028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:43.676795 systemd[1]: Started sshd@16-172.31.24.1:22-4.4.66.82:53028.service. Nov 1 00:15:44.176567 kubelet[2201]: E1101 00:15:44.176497 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:44.382827 sshd[3686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:44.382000 audit[3686]: USER_AUTH pid=3686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:45.132630 kubelet[2201]: E1101 00:15:45.132556 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:45.162748 env[1808]: time="2025-11-01T00:15:45.162689937Z" level=info msg="StopPodSandbox for \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\"" Nov 1 00:15:45.177634 kubelet[2201]: E1101 00:15:45.177572 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.228 [WARNING][3698] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-csi--node--driver--9grks-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"36aecd38-8986-4e27-8710-f1385049c6a9", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 14, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a", Pod:"csi-node-driver-9grks", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d66c15488b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.228 [INFO][3698] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.228 [INFO][3698] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" iface="eth0" netns="" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.228 [INFO][3698] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.229 [INFO][3698] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.263 [INFO][3705] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.263 [INFO][3705] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.264 [INFO][3705] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.277 [WARNING][3705] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.277 [INFO][3705] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.280 [INFO][3705] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:45.285755 env[1808]: 2025-11-01 00:15:45.283 [INFO][3698] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.285755 env[1808]: time="2025-11-01T00:15:45.285715237Z" level=info msg="TearDown network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\" successfully" Nov 1 00:15:45.286702 env[1808]: time="2025-11-01T00:15:45.285777866Z" level=info msg="StopPodSandbox for \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\" returns successfully" Nov 1 00:15:45.287111 env[1808]: time="2025-11-01T00:15:45.287065592Z" level=info msg="RemovePodSandbox for \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\"" Nov 1 00:15:45.287378 env[1808]: time="2025-11-01T00:15:45.287271415Z" level=info msg="Forcibly stopping sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\"" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.352 [WARNING][3719] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-csi--node--driver--9grks-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"36aecd38-8986-4e27-8710-f1385049c6a9", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 14, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"15ea8efb901953af2292a0d29b30fa73c3925b3e88e2e949d5e5417febe39e2a", Pod:"csi-node-driver-9grks", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d66c15488b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.352 [INFO][3719] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.352 [INFO][3719] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" iface="eth0" netns="" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.352 [INFO][3719] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.352 [INFO][3719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.394 [INFO][3727] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.395 [INFO][3727] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.395 [INFO][3727] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.415 [WARNING][3727] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.415 [INFO][3727] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" HandleID="k8s-pod-network.344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Workload="172.31.24.1-k8s-csi--node--driver--9grks-eth0" Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.418 [INFO][3727] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:45.428599 env[1808]: 2025-11-01 00:15:45.423 [INFO][3719] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00" Nov 1 00:15:45.429826 env[1808]: time="2025-11-01T00:15:45.429763842Z" level=info msg="TearDown network for sandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\" successfully" Nov 1 00:15:45.435868 env[1808]: time="2025-11-01T00:15:45.435754102Z" level=info msg="RemovePodSandbox \"344cfabecdb43ef74f711fff3537ab85850ea66ee3459ad9c655b37592158c00\" returns successfully" Nov 1 00:15:45.443975 env[1808]: time="2025-11-01T00:15:45.442813849Z" level=info msg="StopPodSandbox for \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\"" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.506 [WARNING][3745] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"88b0b19f-3e1c-493e-90b0-a78bb677c316", ResourceVersion:"1355", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30", Pod:"nginx-deployment-7fcdb87857-rsx29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic5e0b8e4904", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.507 [INFO][3745] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.507 [INFO][3745] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" iface="eth0" netns="" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.507 [INFO][3745] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.507 [INFO][3745] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.543 [INFO][3752] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.543 [INFO][3752] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.544 [INFO][3752] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.559 [WARNING][3752] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.559 [INFO][3752] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.564 [INFO][3752] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:45.569452 env[1808]: 2025-11-01 00:15:45.566 [INFO][3745] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.570568 env[1808]: time="2025-11-01T00:15:45.570516824Z" level=info msg="TearDown network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\" successfully" Nov 1 00:15:45.570709 env[1808]: time="2025-11-01T00:15:45.570676431Z" level=info msg="StopPodSandbox for \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\" returns successfully" Nov 1 00:15:45.571793 env[1808]: time="2025-11-01T00:15:45.571407962Z" level=info msg="RemovePodSandbox for \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\"" Nov 1 00:15:45.572003 env[1808]: time="2025-11-01T00:15:45.571940006Z" level=info msg="Forcibly stopping sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\"" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.639 [WARNING][3766] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"88b0b19f-3e1c-493e-90b0-a78bb677c316", ResourceVersion:"1355", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"75d2c193f73459303fd0f6fdbce0f59c587eec20ae374f5434b3c3bafc53df30", Pod:"nginx-deployment-7fcdb87857-rsx29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic5e0b8e4904", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.640 [INFO][3766] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.640 [INFO][3766] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" iface="eth0" netns="" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.640 [INFO][3766] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.640 [INFO][3766] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.676 [INFO][3773] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.676 [INFO][3773] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.676 [INFO][3773] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.708 [WARNING][3773] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.709 [INFO][3773] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" HandleID="k8s-pod-network.bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Workload="172.31.24.1-k8s-nginx--deployment--7fcdb87857--rsx29-eth0" Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.734 [INFO][3773] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:45.741342 env[1808]: 2025-11-01 00:15:45.737 [INFO][3766] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f" Nov 1 00:15:45.742336 env[1808]: time="2025-11-01T00:15:45.741596115Z" level=info msg="TearDown network for sandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\" successfully" Nov 1 00:15:45.749031 env[1808]: time="2025-11-01T00:15:45.748963258Z" level=info msg="RemovePodSandbox \"bcf6c7620f2b4956cb175112805e4497ea9b44da0cee5941dcb39e721e4a1c7f\" returns successfully" Nov 1 00:15:46.177979 kubelet[2201]: E1101 00:15:46.177857 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:46.543825 sshd[3686]: Failed password for root from 4.4.66.82 port 53028 ssh2 Nov 1 00:15:47.178732 kubelet[2201]: E1101 00:15:47.178664 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:48.179207 kubelet[2201]: E1101 00:15:48.179136 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:48.185866 sshd[3686]: Connection closed by authenticating user root 4.4.66.82 port 53028 [preauth] Nov 1 00:15:48.188273 systemd[1]: sshd@16-172.31.24.1:22-4.4.66.82:53028.service: Deactivated successfully. Nov 1 00:15:48.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.24.1:22-4.4.66.82:53028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:48.190789 kernel: kauditd_printk_skb: 14 callbacks suppressed Nov 1 00:15:48.190929 kernel: audit: type=1131 audit(1761956148.188:807): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.24.1:22-4.4.66.82:53028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:48.317655 systemd[1]: Started sshd@17-172.31.24.1:22-4.4.66.82:60270.service. Nov 1 00:15:48.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.24.1:22-4.4.66.82:60270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:48.328575 kernel: audit: type=1130 audit(1761956148.317:808): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.24.1:22-4.4.66.82:60270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:48.978163 sshd[3783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:48.978000 audit[3783]: USER_AUTH pid=3783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:48.988530 kernel: audit: type=1100 audit(1761956148.978:809): pid=3783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:49.179981 kubelet[2201]: E1101 00:15:49.179899 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:50.180821 kubelet[2201]: E1101 00:15:50.180761 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:50.351694 sshd[3783]: Failed password for root from 4.4.66.82 port 60270 ssh2 Nov 1 00:15:50.937311 sshd[3783]: Connection closed by authenticating user root 4.4.66.82 port 60270 [preauth] Nov 1 00:15:50.939447 systemd[1]: sshd@17-172.31.24.1:22-4.4.66.82:60270.service: Deactivated successfully. Nov 1 00:15:50.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.24.1:22-4.4.66.82:60270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:50.949569 kernel: audit: type=1131 audit(1761956150.938:810): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.24.1:22-4.4.66.82:60270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:51.070012 systemd[1]: Started sshd@18-172.31.24.1:22-4.4.66.82:36340.service. Nov 1 00:15:51.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.24.1:22-4.4.66.82:36340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:51.081565 kernel: audit: type=1130 audit(1761956151.068:811): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.24.1:22-4.4.66.82:36340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:51.181188 kubelet[2201]: E1101 00:15:51.181123 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:51.737398 sshd[3787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:51.736000 audit[3787]: USER_AUTH pid=3787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:51.747533 kernel: audit: type=1100 audit(1761956151.736:812): pid=3787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:52.182088 kubelet[2201]: E1101 00:15:52.182020 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:53.182373 kubelet[2201]: E1101 00:15:53.182329 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:53.857919 sshd[3787]: Failed password for root from 4.4.66.82 port 36340 ssh2 Nov 1 00:15:54.184042 kubelet[2201]: E1101 00:15:54.183984 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:55.185395 kubelet[2201]: E1101 00:15:55.185344 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:55.368275 env[1808]: time="2025-11-01T00:15:55.368211506Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:15:55.394690 kubelet[2201]: I1101 00:15:55.394612 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=15.420903155 podStartE2EDuration="22.394592543s" podCreationTimestamp="2025-11-01 00:15:33 +0000 UTC" firstStartedPulling="2025-11-01 00:15:34.728772717 +0000 UTC m=+50.348417214" lastFinishedPulling="2025-11-01 00:15:41.702462093 +0000 UTC m=+57.322106602" observedRunningTime="2025-11-01 00:15:42.574007382 +0000 UTC m=+58.193651891" watchObservedRunningTime="2025-11-01 00:15:55.394592543 +0000 UTC m=+71.014237028" Nov 1 00:15:55.533538 sshd[3787]: Connection closed by authenticating user root 4.4.66.82 port 36340 [preauth] Nov 1 00:15:55.535346 systemd[1]: sshd@18-172.31.24.1:22-4.4.66.82:36340.service: Deactivated successfully. Nov 1 00:15:55.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.24.1:22-4.4.66.82:36340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:55.545553 kernel: audit: type=1131 audit(1761956155.535:813): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.24.1:22-4.4.66.82:36340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:55.615355 env[1808]: time="2025-11-01T00:15:55.615253366Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:55.616583 env[1808]: time="2025-11-01T00:15:55.616498944Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:15:55.617533 kubelet[2201]: E1101 00:15:55.616913 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:55.617533 kubelet[2201]: E1101 00:15:55.616974 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:55.617533 kubelet[2201]: E1101 00:15:55.617139 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:55.620340 env[1808]: time="2025-11-01T00:15:55.620224601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:15:55.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.24.1:22-4.4.66.82:43412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:55.675346 systemd[1]: Started sshd@19-172.31.24.1:22-4.4.66.82:43412.service. Nov 1 00:15:55.686539 kernel: audit: type=1130 audit(1761956155.675:814): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.24.1:22-4.4.66.82:43412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:55.865072 env[1808]: time="2025-11-01T00:15:55.864901930Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:55.867049 env[1808]: time="2025-11-01T00:15:55.866938076Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:15:55.867591 kubelet[2201]: E1101 00:15:55.867525 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:55.867767 kubelet[2201]: E1101 00:15:55.867735 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:55.868907 kubelet[2201]: E1101 00:15:55.868762 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:55.870579 kubelet[2201]: E1101 00:15:55.870500 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:15:56.186721 kubelet[2201]: E1101 00:15:56.186562 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:56.380261 sshd[3814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:15:56.380000 audit[3814]: USER_AUTH pid=3814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:56.389511 kernel: audit: type=1100 audit(1761956156.380:815): pid=3814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:15:57.187219 kubelet[2201]: E1101 00:15:57.187167 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:58.188129 kubelet[2201]: E1101 00:15:58.188078 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:58.518544 sshd[3814]: Failed password for root from 4.4.66.82 port 43412 ssh2 Nov 1 00:15:59.189801 kubelet[2201]: E1101 00:15:59.189721 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:00.182815 sshd[3814]: Connection closed by authenticating user root 4.4.66.82 port 43412 [preauth] Nov 1 00:16:00.185596 systemd[1]: sshd@19-172.31.24.1:22-4.4.66.82:43412.service: Deactivated successfully. Nov 1 00:16:00.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.24.1:22-4.4.66.82:43412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:00.190731 kubelet[2201]: E1101 00:16:00.190678 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:00.196647 kernel: audit: type=1131 audit(1761956160.184:816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.24.1:22-4.4.66.82:43412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:00.322682 systemd[1]: Started sshd@20-172.31.24.1:22-4.4.66.82:50598.service. Nov 1 00:16:00.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.24.1:22-4.4.66.82:50598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:00.334545 kernel: audit: type=1130 audit(1761956160.321:817): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.24.1:22-4.4.66.82:50598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:01.005890 sshd[3818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:01.004000 audit[3818]: USER_AUTH pid=3818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:01.015613 kernel: audit: type=1100 audit(1761956161.004:818): pid=3818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:01.192341 kubelet[2201]: E1101 00:16:01.192274 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:02.193007 kubelet[2201]: E1101 00:16:02.192962 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:03.166146 sshd[3818]: Failed password for root from 4.4.66.82 port 50598 ssh2 Nov 1 00:16:03.193799 kubelet[2201]: E1101 00:16:03.193734 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:04.194454 kubelet[2201]: E1101 00:16:04.194371 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:04.804051 sshd[3818]: Connection closed by authenticating user root 4.4.66.82 port 50598 [preauth] Nov 1 00:16:04.806614 systemd[1]: sshd@20-172.31.24.1:22-4.4.66.82:50598.service: Deactivated successfully. Nov 1 00:16:04.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.24.1:22-4.4.66.82:50598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:04.816583 kernel: audit: type=1131 audit(1761956164.805:819): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.24.1:22-4.4.66.82:50598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:04.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.24.1:22-4.4.66.82:57712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:04.937986 systemd[1]: Started sshd@21-172.31.24.1:22-4.4.66.82:57712.service. Nov 1 00:16:04.948525 kernel: audit: type=1130 audit(1761956164.936:820): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.24.1:22-4.4.66.82:57712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:05.131870 kubelet[2201]: E1101 00:16:05.131746 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:05.194620 kubelet[2201]: E1101 00:16:05.194573 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:05.613196 sshd[3823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:05.612000 audit[3823]: USER_AUTH pid=3823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:05.623593 kernel: audit: type=1100 audit(1761956165.612:821): pid=3823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:06.195715 kubelet[2201]: E1101 00:16:06.195673 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:07.196714 kubelet[2201]: E1101 00:16:07.196641 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:07.271697 systemd[1]: Created slice kubepods-besteffort-pod435d68d8_5334_4f26_977d_40ea3c3a8648.slice. Nov 1 00:16:07.321900 sshd[3823]: Failed password for root from 4.4.66.82 port 57712 ssh2 Nov 1 00:16:07.336747 kubelet[2201]: I1101 00:16:07.336654 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mwjcp\" (UniqueName: \"kubernetes.io/projected/435d68d8-5334-4f26-977d-40ea3c3a8648-kube-api-access-mwjcp\") pod \"test-pod-1\" (UID: \"435d68d8-5334-4f26-977d-40ea3c3a8648\") " pod="default/test-pod-1" Nov 1 00:16:07.337237 kubelet[2201]: I1101 00:16:07.336806 2201 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a6299e0c-568b-41b4-bf9e-007f85f79b93\" (UniqueName: \"kubernetes.io/nfs/435d68d8-5334-4f26-977d-40ea3c3a8648-pvc-a6299e0c-568b-41b4-bf9e-007f85f79b93\") pod \"test-pod-1\" (UID: \"435d68d8-5334-4f26-977d-40ea3c3a8648\") " pod="default/test-pod-1" Nov 1 00:16:07.470000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.486314 kernel: Failed to create system directory netfs Nov 1 00:16:07.486453 kernel: audit: type=1400 audit(1761956167.470:822): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.486533 kernel: Failed to create system directory netfs Nov 1 00:16:07.486577 kernel: audit: type=1400 audit(1761956167.470:822): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.470000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.496991 kernel: Failed to create system directory netfs Nov 1 00:16:07.497059 kernel: audit: type=1400 audit(1761956167.470:822): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.470000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.507711 kernel: Failed to create system directory netfs Nov 1 00:16:07.507815 kernel: audit: type=1400 audit(1761956167.470:822): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.470000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.470000 audit[3828]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadaa205e0 a1=12c14 a2=aaaad303e028 a3=aaaadaa11010 items=0 ppid=70 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:07.529309 kernel: audit: type=1300 audit(1761956167.470:822): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadaa205e0 a1=12c14 a2=aaaad303e028 a3=aaaadaa11010 items=0 ppid=70 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:07.470000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:07.536338 kernel: audit: type=1327 audit(1761956167.470:822): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:07.536448 kernel: Failed to create system directory fscache Nov 1 00:16:07.536518 kernel: audit: type=1400 audit(1761956167.521:823): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.546963 kernel: Failed to create system directory fscache Nov 1 00:16:07.547043 kernel: audit: type=1400 audit(1761956167.521:823): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.557430 kernel: Failed to create system directory fscache Nov 1 00:16:07.557546 kernel: audit: type=1400 audit(1761956167.521:823): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.568088 kernel: Failed to create system directory fscache Nov 1 00:16:07.568161 kernel: audit: type=1400 audit(1761956167.521:823): avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.577653 kernel: Failed to create system directory fscache Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.579776 sshd[3823]: Connection closed by authenticating user root 4.4.66.82 port 57712 [preauth] Nov 1 00:16:07.581439 systemd[1]: sshd@21-172.31.24.1:22-4.4.66.82:57712.service: Deactivated successfully. Nov 1 00:16:07.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.24.1:22-4.4.66.82:57712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.585850 kernel: Failed to create system directory fscache Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.588055 kernel: Failed to create system directory fscache Nov 1 00:16:07.588157 kernel: Failed to create system directory fscache Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.592074 kernel: Failed to create system directory fscache Nov 1 00:16:07.592165 kernel: Failed to create system directory fscache Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.595884 kernel: Failed to create system directory fscache Nov 1 00:16:07.595959 kernel: Failed to create system directory fscache Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.599742 kernel: Failed to create system directory fscache Nov 1 00:16:07.599808 kernel: Failed to create system directory fscache Nov 1 00:16:07.521000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.603226 kernel: FS-Cache: Loaded Nov 1 00:16:07.521000 audit[3828]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadac33210 a1=4c344 a2=aaaad303e028 a3=aaaadaa11010 items=0 ppid=70 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:07.521000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.647163 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.647254 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.649232 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.649378 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.653379 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.653448 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.656894 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.656975 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.660663 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.660743 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.664449 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.664553 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.666520 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.670267 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.670363 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.674066 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.674613 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.676045 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.679838 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.679943 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.683647 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.683726 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.687384 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.687458 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.691161 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.691247 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.694967 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.695065 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.698750 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.698846 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.700875 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.704817 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.715587 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.715698 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.24.1:22-4.4.66.82:33846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.717955 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.711139 systemd[1]: Started sshd@22-172.31.24.1:22-4.4.66.82:33846.service. Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.720521 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.722531 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.722651 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.726279 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.726376 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.730062 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.730174 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.733881 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.733941 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.737631 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.737719 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.746360 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.746445 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.750058 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.750115 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.751857 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.753773 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.755919 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.757404 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.759404 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.763260 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.763317 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.765045 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.766971 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.768791 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.770716 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.772581 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.776305 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.776354 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.778115 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.780041 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.783812 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.783865 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.785585 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.787510 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.789319 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.791352 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.793069 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.794991 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.796783 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.798712 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.800526 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.804323 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.804423 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.806184 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.808012 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.809960 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.811718 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.813615 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.815403 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.817326 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.819158 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.821081 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.824920 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.824973 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.828623 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.828674 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.830504 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.834205 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.834317 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.836011 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.837918 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.841617 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.841709 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.845338 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.845387 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.849099 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.849200 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.851007 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.854653 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.854702 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.856431 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.858355 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.860171 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.862113 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.863963 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.865826 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.867682 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.869548 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.871400 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.873277 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.875130 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.876991 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.878835 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.880686 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.882534 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.884406 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.886229 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.888099 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.889946 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.891801 kernel: Failed to create system directory sunrpc Nov 1 00:16:07.631000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.905590 kernel: RPC: Registered named UNIX socket transport module. Nov 1 00:16:07.905726 kernel: RPC: Registered udp transport module. Nov 1 00:16:07.905795 kernel: RPC: Registered tcp transport module. Nov 1 00:16:07.907245 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 1 00:16:07.631000 audit[3828]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadac7f560 a1=14a804 a2=aaaad303e028 a3=aaaadaa11010 items=6 ppid=70 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:07.631000 audit: CWD cwd="/" Nov 1 00:16:07.631000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:07.631000 audit: PATH item=1 name=(null) inode=19338 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:07.631000 audit: PATH item=2 name=(null) inode=19338 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:07.631000 audit: PATH item=3 name=(null) inode=19339 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:07.631000 audit: PATH item=4 name=(null) inode=19338 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:07.631000 audit: PATH item=5 name=(null) inode=19340 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:07.631000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.960710 kernel: Failed to create system directory nfs Nov 1 00:16:07.960808 kernel: Failed to create system directory nfs Nov 1 00:16:07.960869 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.964205 kernel: Failed to create system directory nfs Nov 1 00:16:07.964300 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.965899 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.967741 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.969403 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.971288 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.972938 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.974776 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.976467 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.978374 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.981817 kernel: Failed to create system directory nfs Nov 1 00:16:07.981872 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.983577 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.985276 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.987133 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.988902 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.999416 kernel: Failed to create system directory nfs Nov 1 00:16:07.999509 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.002984 kernel: Failed to create system directory nfs Nov 1 00:16:08.003126 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.004648 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.006481 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.008175 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.009999 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.011907 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.015333 kernel: Failed to create system directory nfs Nov 1 00:16:08.015442 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.018877 kernel: Failed to create system directory nfs Nov 1 00:16:08.019019 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.022392 kernel: Failed to create system directory nfs Nov 1 00:16:08.022446 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.025937 kernel: Failed to create system directory nfs Nov 1 00:16:08.025987 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.029486 kernel: Failed to create system directory nfs Nov 1 00:16:08.029568 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.033063 kernel: Failed to create system directory nfs Nov 1 00:16:08.033148 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.036598 kernel: Failed to create system directory nfs Nov 1 00:16:08.036650 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.040146 kernel: Failed to create system directory nfs Nov 1 00:16:08.040199 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.041849 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.043672 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.045361 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.047199 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.048910 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.050745 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.052540 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.054271 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.056076 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.059647 kernel: Failed to create system directory nfs Nov 1 00:16:08.059751 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.061409 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.063216 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.064954 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.066742 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.068501 kernel: Failed to create system directory nfs Nov 1 00:16:07.948000 audit[3828]: AVC avc: denied { confidentiality } for pid=3828 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.100607 kernel: FS-Cache: Netfs 'nfs' registered for caching Nov 1 00:16:07.948000 audit[3828]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadae28b50 a1=116324 a2=aaaad303e028 a3=aaaadaa11010 items=0 ppid=70 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:07.948000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.153884 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.153997 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.154040 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.155608 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.157440 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.159206 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.161080 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.162825 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.164669 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.168411 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.168535 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.171972 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.172027 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.175595 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.175646 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.179250 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.179329 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.181090 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.184671 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.184749 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.186495 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.188291 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.191928 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.192021 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.193724 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.195564 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.197810 kubelet[2201]: E1101 00:16:08.197713 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:08.199258 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.199317 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.202874 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.202955 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.206466 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.206579 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.210152 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.210205 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.213796 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.213851 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.217400 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.217450 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.219229 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.221073 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.222896 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.226531 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.226583 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.228331 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.230180 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.231983 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.233794 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.235611 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.237432 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.239294 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.246660 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.246773 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.246818 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.246878 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.248557 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.256567 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.256669 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.256711 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.256751 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.257608 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.261298 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.261414 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.264803 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.264915 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.268448 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.268594 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.272074 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.272174 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.273812 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.275682 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.277467 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.279327 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.281159 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.282951 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.284743 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.286597 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.290185 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.290340 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.291990 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.293783 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.295576 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.297364 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.299204 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.301043 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.302841 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.304656 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.306450 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.308274 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.310092 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.311905 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.313686 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.315523 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.317299 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.319150 kernel: Failed to create system directory nfs4 Nov 1 00:16:08.136000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.382000 audit[3832]: USER_AUTH pid=3832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:08.383931 sshd[3832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:08.497258 kernel: NFS: Registering the id_resolver key type Nov 1 00:16:08.497432 kernel: Key type id_resolver registered Nov 1 00:16:08.497519 kernel: Key type id_legacy registered Nov 1 00:16:08.136000 audit[3837]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff903fa010 a1=19c744 a2=aaaabfd3e028 a3=aaaacc437010 items=0 ppid=70 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:08.136000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.522105 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.522189 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.524278 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.526240 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.528194 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.530227 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.532262 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.534308 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.536243 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.538274 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.540266 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.542289 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.544296 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.546256 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.548207 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.550216 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.552236 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.554259 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.554559 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.558270 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.558333 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.562159 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.562229 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.566122 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.566172 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.568086 kernel: Failed to create system directory rpcgss Nov 1 00:16:08.513000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:08.513000 audit[3838]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffab632010 a1=5eedc a2=aaaaaf61e028 a3=aaaab4c6b010 items=0 ppid=70 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:08.513000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Nov 1 00:16:08.597622 nfsidmap[3847]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Nov 1 00:16:08.604672 nfsidmap[3848]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Nov 1 00:16:08.619000 audit[2009]: AVC avc: denied { watch_reads } for pid=2009 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:08.619000 audit[2009]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae09421f0 a2=10 a3=0 items=0 ppid=1 pid=2009 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:08.619000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:16:08.619000 audit[2009]: AVC avc: denied { watch_reads } for pid=2009 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:08.619000 audit[2009]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae09421f0 a2=10 a3=0 items=0 ppid=1 pid=2009 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:08.619000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:16:08.619000 audit[2009]: AVC avc: denied { watch_reads } for pid=2009 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:08.619000 audit[2009]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae09421f0 a2=10 a3=0 items=0 ppid=1 pid=2009 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:08.619000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:16:08.621000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:08.621000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:08.621000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:08.778250 env[1808]: time="2025-11-01T00:16:08.777596587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:435d68d8-5334-4f26-977d-40ea3c3a8648,Namespace:default,Attempt:0,}" Nov 1 00:16:08.971982 (udev-worker)[3829]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:16:08.977194 systemd-networkd[1528]: cali5ec59c6bf6e: Link UP Nov 1 00:16:08.984745 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:16:08.985709 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Nov 1 00:16:08.985290 systemd-networkd[1528]: cali5ec59c6bf6e: Gained carrier Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.855 [INFO][3850] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.1-k8s-test--pod--1-eth0 default 435d68d8-5334-4f26-977d-40ea3c3a8648 1586 0 2025-11-01 00:15:34 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.24.1 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.855 [INFO][3850] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-eth0" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.897 [INFO][3862] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" HandleID="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Workload="172.31.24.1-k8s-test--pod--1-eth0" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.898 [INFO][3862] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" HandleID="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Workload="172.31.24.1-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3010), Attrs:map[string]string{"namespace":"default", "node":"172.31.24.1", "pod":"test-pod-1", "timestamp":"2025-11-01 00:16:08.897797406 +0000 UTC"}, Hostname:"172.31.24.1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.898 [INFO][3862] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.898 [INFO][3862] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.898 [INFO][3862] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.1' Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.911 [INFO][3862] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.918 [INFO][3862] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.931 [INFO][3862] ipam/ipam.go 511: Trying affinity for 192.168.127.128/26 host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.934 [INFO][3862] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.939 [INFO][3862] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.128/26 host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.939 [INFO][3862] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.127.128/26 handle="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.943 [INFO][3862] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534 Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.951 [INFO][3862] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.127.128/26 handle="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.965 [INFO][3862] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.127.132/26] block=192.168.127.128/26 handle="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.965 [INFO][3862] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.132/26] handle="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" host="172.31.24.1" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.965 [INFO][3862] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.965 [INFO][3862] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.127.132/26] IPv6=[] ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" HandleID="k8s-pod-network.4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Workload="172.31.24.1-k8s-test--pod--1-eth0" Nov 1 00:16:09.013523 env[1808]: 2025-11-01 00:16:08.968 [INFO][3850] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"435d68d8-5334-4f26-977d-40ea3c3a8648", ResourceVersion:"1586", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:09.014883 env[1808]: 2025-11-01 00:16:08.968 [INFO][3850] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.132/32] ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-eth0" Nov 1 00:16:09.014883 env[1808]: 2025-11-01 00:16:08.968 [INFO][3850] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-eth0" Nov 1 00:16:09.014883 env[1808]: 2025-11-01 00:16:08.986 [INFO][3850] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-eth0" Nov 1 00:16:09.014883 env[1808]: 2025-11-01 00:16:08.992 [INFO][3850] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.1-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"435d68d8-5334-4f26-977d-40ea3c3a8648", ResourceVersion:"1586", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.1", ContainerID:"4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2a:27:9f:46:8c:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:09.014883 env[1808]: 2025-11-01 00:16:09.006 [INFO][3850] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.1-k8s-test--pod--1-eth0" Nov 1 00:16:09.033370 env[1808]: time="2025-11-01T00:16:09.033120534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:16:09.033370 env[1808]: time="2025-11-01T00:16:09.033290271Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:16:09.033629 env[1808]: time="2025-11-01T00:16:09.033354062Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:16:09.037349 env[1808]: time="2025-11-01T00:16:09.036682464Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534 pid=3885 runtime=io.containerd.runc.v2 Nov 1 00:16:09.035000 audit[3886]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:16:09.035000 audit[3886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffff0b55e00 a2=0 a3=ffff964aafa8 items=0 ppid=2891 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.035000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:16:09.073432 systemd[1]: Started cri-containerd-4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534.scope. Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.115000 audit: BPF prog-id=123 op=LOAD Nov 1 00:16:09.117000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.117000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303561386536343166343939333239363630343964646239353439 Nov 1 00:16:09.117000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.117000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303561386536343166343939333239363630343964646239353439 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.118000 audit: BPF prog-id=124 op=LOAD Nov 1 00:16:09.118000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303561386536343166343939333239363630343964646239353439 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.120000 audit: BPF prog-id=125 op=LOAD Nov 1 00:16:09.120000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303561386536343166343939333239363630343964646239353439 Nov 1 00:16:09.121000 audit: BPF prog-id=125 op=UNLOAD Nov 1 00:16:09.121000 audit: BPF prog-id=124 op=UNLOAD Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.121000 audit: BPF prog-id=126 op=LOAD Nov 1 00:16:09.121000 audit[3896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3885 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303561386536343166343939333239363630343964646239353439 Nov 1 00:16:09.164676 env[1808]: time="2025-11-01T00:16:09.164620947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:435d68d8-5334-4f26-977d-40ea3c3a8648,Namespace:default,Attempt:0,} returns sandbox id \"4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534\"" Nov 1 00:16:09.166784 env[1808]: time="2025-11-01T00:16:09.166699908Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:16:09.198565 kubelet[2201]: E1101 00:16:09.198501 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:09.437564 env[1808]: time="2025-11-01T00:16:09.437497961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:09.439833 env[1808]: time="2025-11-01T00:16:09.439767611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:09.443459 env[1808]: time="2025-11-01T00:16:09.443404744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:09.446624 env[1808]: time="2025-11-01T00:16:09.446576189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:09.448170 env[1808]: time="2025-11-01T00:16:09.448122408Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Nov 1 00:16:09.453588 env[1808]: time="2025-11-01T00:16:09.453528716Z" level=info msg="CreateContainer within sandbox \"4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534\" for container &ContainerMetadata{Name:test,Attempt:0,}" Nov 1 00:16:09.474632 env[1808]: time="2025-11-01T00:16:09.474542894Z" level=info msg="CreateContainer within sandbox \"4d05a8e641f49932966049ddb9549b39af2586cf2e29b1eff726010b90984534\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"eca9ef6a23e84bc54089ffd830be59ab4d7c5582410acae501e75af2e9953d6a\"" Nov 1 00:16:09.475781 env[1808]: time="2025-11-01T00:16:09.475724116Z" level=info msg="StartContainer for \"eca9ef6a23e84bc54089ffd830be59ab4d7c5582410acae501e75af2e9953d6a\"" Nov 1 00:16:09.503747 systemd[1]: Started cri-containerd-eca9ef6a23e84bc54089ffd830be59ab4d7c5582410acae501e75af2e9953d6a.scope. Nov 1 00:16:09.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.544000 audit: BPF prog-id=127 op=LOAD Nov 1 00:16:09.545000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.545000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3885 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613965663661323365383462633534303839666664383330626535 Nov 1 00:16:09.545000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.545000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3885 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613965663661323365383462633534303839666664383330626535 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.546000 audit: BPF prog-id=128 op=LOAD Nov 1 00:16:09.546000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3885 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613965663661323365383462633534303839666664383330626535 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.547000 audit: BPF prog-id=129 op=LOAD Nov 1 00:16:09.547000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3885 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613965663661323365383462633534303839666664383330626535 Nov 1 00:16:09.548000 audit: BPF prog-id=129 op=UNLOAD Nov 1 00:16:09.548000 audit: BPF prog-id=128 op=UNLOAD Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:09.549000 audit: BPF prog-id=130 op=LOAD Nov 1 00:16:09.549000 audit[3927]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3885 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:09.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613965663661323365383462633534303839666664383330626535 Nov 1 00:16:09.578879 env[1808]: time="2025-11-01T00:16:09.578805696Z" level=info msg="StartContainer for \"eca9ef6a23e84bc54089ffd830be59ab4d7c5582410acae501e75af2e9953d6a\" returns successfully" Nov 1 00:16:10.199441 kubelet[2201]: E1101 00:16:10.199401 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:10.484334 systemd[1]: run-containerd-runc-k8s.io-9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68-runc.jptOLE.mount: Deactivated successfully. Nov 1 00:16:10.506419 sshd[3832]: Failed password for root from 4.4.66.82 port 33846 ssh2 Nov 1 00:16:10.938979 systemd-networkd[1528]: cali5ec59c6bf6e: Gained IPv6LL Nov 1 00:16:11.200577 kubelet[2201]: E1101 00:16:11.200412 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:11.369027 kubelet[2201]: E1101 00:16:11.368944 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:16:11.409435 kubelet[2201]: I1101 00:16:11.409347 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=37.124826891 podStartE2EDuration="37.409325186s" podCreationTimestamp="2025-11-01 00:15:34 +0000 UTC" firstStartedPulling="2025-11-01 00:16:09.166182214 +0000 UTC m=+84.785826699" lastFinishedPulling="2025-11-01 00:16:09.450680497 +0000 UTC m=+85.070324994" observedRunningTime="2025-11-01 00:16:09.642013504 +0000 UTC m=+85.261658037" watchObservedRunningTime="2025-11-01 00:16:11.409325186 +0000 UTC m=+87.028969683" Nov 1 00:16:12.177582 sshd[3832]: Connection closed by authenticating user root 4.4.66.82 port 33846 [preauth] Nov 1 00:16:12.179499 systemd[1]: sshd@22-172.31.24.1:22-4.4.66.82:33846.service: Deactivated successfully. Nov 1 00:16:12.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.24.1:22-4.4.66.82:33846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:12.200881 kubelet[2201]: E1101 00:16:12.200765 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:12.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.24.1:22-4.4.66.82:40914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:12.316256 systemd[1]: Started sshd@23-172.31.24.1:22-4.4.66.82:40914.service. Nov 1 00:16:13.010292 sshd[3998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:13.010000 audit[3998]: USER_AUTH pid=3998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:13.012650 kernel: kauditd_printk_skb: 467 callbacks suppressed Nov 1 00:16:13.012752 kernel: audit: type=1100 audit(1761956173.010:876): pid=3998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:13.201899 kubelet[2201]: E1101 00:16:13.201826 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:14.202618 kubelet[2201]: E1101 00:16:14.202570 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:15.151390 sshd[3998]: Failed password for root from 4.4.66.82 port 40914 ssh2 Nov 1 00:16:15.203382 kubelet[2201]: E1101 00:16:15.203314 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:16.203598 kubelet[2201]: E1101 00:16:16.203554 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:16.811164 sshd[3998]: Connection closed by authenticating user root 4.4.66.82 port 40914 [preauth] Nov 1 00:16:16.812865 systemd[1]: sshd@23-172.31.24.1:22-4.4.66.82:40914.service: Deactivated successfully. Nov 1 00:16:16.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.24.1:22-4.4.66.82:40914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:16.823772 kernel: audit: type=1131 audit(1761956176.812:877): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.24.1:22-4.4.66.82:40914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:16.945386 systemd[1]: Started sshd@24-172.31.24.1:22-4.4.66.82:48068.service. Nov 1 00:16:16.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.24.1:22-4.4.66.82:48068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:16.957524 kernel: audit: type=1130 audit(1761956176.945:878): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.24.1:22-4.4.66.82:48068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:17.204981 kubelet[2201]: E1101 00:16:17.204922 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:17.615000 audit[4005]: USER_AUTH pid=4005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:17.615597 sshd[4005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:17.625597 kernel: audit: type=1100 audit(1761956177.615:879): pid=4005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:18.206058 kubelet[2201]: E1101 00:16:18.205990 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:19.207026 kubelet[2201]: E1101 00:16:19.206960 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:19.304403 sshd[4005]: Failed password for root from 4.4.66.82 port 48068 ssh2 Nov 1 00:16:19.577725 sshd[4005]: Connection closed by authenticating user root 4.4.66.82 port 48068 [preauth] Nov 1 00:16:19.579137 systemd[1]: sshd@24-172.31.24.1:22-4.4.66.82:48068.service: Deactivated successfully. Nov 1 00:16:19.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.24.1:22-4.4.66.82:48068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:19.589519 kernel: audit: type=1131 audit(1761956179.579:880): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.24.1:22-4.4.66.82:48068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:19.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.24.1:22-4.4.66.82:52374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:19.713171 systemd[1]: Started sshd@25-172.31.24.1:22-4.4.66.82:52374.service. Nov 1 00:16:19.724540 kernel: audit: type=1130 audit(1761956179.713:881): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.24.1:22-4.4.66.82:52374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:20.207872 kubelet[2201]: E1101 00:16:20.207783 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:20.392623 sshd[4011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:20.392000 audit[4011]: USER_AUTH pid=4011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:20.402594 kernel: audit: type=1100 audit(1761956180.392:882): pid=4011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:21.208915 kubelet[2201]: E1101 00:16:21.208843 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:22.209584 kubelet[2201]: E1101 00:16:22.209520 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:22.493556 sshd[4011]: Failed password for root from 4.4.66.82 port 52374 ssh2 Nov 1 00:16:23.209723 kubelet[2201]: E1101 00:16:23.209644 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:24.190071 sshd[4011]: Connection closed by authenticating user root 4.4.66.82 port 52374 [preauth] Nov 1 00:16:24.192220 systemd[1]: sshd@25-172.31.24.1:22-4.4.66.82:52374.service: Deactivated successfully. Nov 1 00:16:24.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.24.1:22-4.4.66.82:52374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:24.202667 kernel: audit: type=1131 audit(1761956184.192:883): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.24.1:22-4.4.66.82:52374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:24.209856 kubelet[2201]: E1101 00:16:24.209783 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:24.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.24.1:22-4.4.66.82:59426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:24.314771 systemd[1]: Started sshd@26-172.31.24.1:22-4.4.66.82:59426.service. Nov 1 00:16:24.324547 kernel: audit: type=1130 audit(1761956184.314:884): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.24.1:22-4.4.66.82:59426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:24.369824 kubelet[2201]: E1101 00:16:24.369728 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:16:24.955451 sshd[4017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:24.955000 audit[4017]: USER_AUTH pid=4017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:24.965534 kernel: audit: type=1100 audit(1761956184.955:885): pid=4017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:25.131736 kubelet[2201]: E1101 00:16:25.131672 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:25.211341 kubelet[2201]: E1101 00:16:25.210847 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:26.211610 kubelet[2201]: E1101 00:16:26.211548 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:26.938665 sshd[4017]: Failed password for root from 4.4.66.82 port 59426 ssh2 Nov 1 00:16:27.212075 kubelet[2201]: E1101 00:16:27.211946 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:27.658310 kubelet[2201]: E1101 00:16:27.658152 2201 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Nov 1 00:16:28.212949 kubelet[2201]: E1101 00:16:28.212903 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:28.745322 sshd[4017]: Connection closed by authenticating user root 4.4.66.82 port 59426 [preauth] Nov 1 00:16:28.747797 systemd[1]: sshd@26-172.31.24.1:22-4.4.66.82:59426.service: Deactivated successfully. Nov 1 00:16:28.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.24.1:22-4.4.66.82:59426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:28.758510 kernel: audit: type=1131 audit(1761956188.747:886): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.24.1:22-4.4.66.82:59426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:28.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.24.1:22-4.4.66.82:38306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:28.897970 systemd[1]: Started sshd@27-172.31.24.1:22-4.4.66.82:38306.service. Nov 1 00:16:28.908529 kernel: audit: type=1130 audit(1761956188.897:887): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.24.1:22-4.4.66.82:38306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:29.214495 kubelet[2201]: E1101 00:16:29.214429 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:29.596925 sshd[4021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:29.597000 audit[4021]: USER_AUTH pid=4021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:29.606527 kernel: audit: type=1100 audit(1761956189.597:888): pid=4021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:30.215618 kubelet[2201]: E1101 00:16:30.215547 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:31.216567 kubelet[2201]: E1101 00:16:31.216524 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:31.267093 sshd[4021]: Failed password for root from 4.4.66.82 port 38306 ssh2 Nov 1 00:16:31.563693 sshd[4021]: Connection closed by authenticating user root 4.4.66.82 port 38306 [preauth] Nov 1 00:16:31.565916 systemd[1]: sshd@27-172.31.24.1:22-4.4.66.82:38306.service: Deactivated successfully. Nov 1 00:16:31.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.24.1:22-4.4.66.82:38306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:31.576763 kernel: audit: type=1131 audit(1761956191.565:889): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.24.1:22-4.4.66.82:38306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:31.688930 systemd[1]: Started sshd@28-172.31.24.1:22-4.4.66.82:42676.service. Nov 1 00:16:31.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.24.1:22-4.4.66.82:42676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:31.700518 kernel: audit: type=1130 audit(1761956191.688:890): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.24.1:22-4.4.66.82:42676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:32.217615 kubelet[2201]: E1101 00:16:32.217551 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:32.338145 sshd[4027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:32.338000 audit[4027]: USER_AUTH pid=4027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:32.348529 kernel: audit: type=1100 audit(1761956192.338:891): pid=4027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:33.218635 kubelet[2201]: E1101 00:16:33.218569 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:34.219062 kubelet[2201]: E1101 00:16:34.219019 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:34.418796 sshd[4027]: Failed password for root from 4.4.66.82 port 42676 ssh2 Nov 1 00:16:35.219805 kubelet[2201]: E1101 00:16:35.219765 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:36.128628 sshd[4027]: Connection closed by authenticating user root 4.4.66.82 port 42676 [preauth] Nov 1 00:16:36.131742 systemd[1]: sshd@28-172.31.24.1:22-4.4.66.82:42676.service: Deactivated successfully. Nov 1 00:16:36.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.24.1:22-4.4.66.82:42676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:36.142528 kernel: audit: type=1131 audit(1761956196.131:892): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.24.1:22-4.4.66.82:42676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:36.221110 kubelet[2201]: E1101 00:16:36.221067 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:36.273161 systemd[1]: Started sshd@29-172.31.24.1:22-4.4.66.82:49738.service. Nov 1 00:16:36.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.24.1:22-4.4.66.82:49738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:36.284526 kernel: audit: type=1130 audit(1761956196.272:893): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.24.1:22-4.4.66.82:49738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:36.971105 sshd[4037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:36.971000 audit[4037]: USER_AUTH pid=4037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:36.981527 kernel: audit: type=1100 audit(1761956196.971:894): pid=4037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:37.222689 kubelet[2201]: E1101 00:16:37.222535 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:37.659182 kubelet[2201]: E1101 00:16:37.658763 2201 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": context deadline exceeded" Nov 1 00:16:38.223005 kubelet[2201]: E1101 00:16:38.222942 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:38.935817 sshd[4037]: Failed password for root from 4.4.66.82 port 49738 ssh2 Nov 1 00:16:39.224037 kubelet[2201]: E1101 00:16:39.223884 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:39.368416 env[1808]: time="2025-11-01T00:16:39.368363907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:16:39.611055 env[1808]: time="2025-11-01T00:16:39.610912680Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:16:39.612376 env[1808]: time="2025-11-01T00:16:39.612301104Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:16:39.612875 kubelet[2201]: E1101 00:16:39.612805 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:16:39.612998 kubelet[2201]: E1101 00:16:39.612896 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:16:39.613228 kubelet[2201]: E1101 00:16:39.613152 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:16:39.615787 env[1808]: time="2025-11-01T00:16:39.615738487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:16:39.861818 env[1808]: time="2025-11-01T00:16:39.861672203Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:16:39.863205 env[1808]: time="2025-11-01T00:16:39.863105459Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:16:39.863927 kubelet[2201]: E1101 00:16:39.863617 2201 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:16:39.863927 kubelet[2201]: E1101 00:16:39.863680 2201 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:16:39.863927 kubelet[2201]: E1101 00:16:39.863830 2201 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mwdx2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9grks_calico-system(36aecd38-8986-4e27-8710-f1385049c6a9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:16:39.865147 kubelet[2201]: E1101 00:16:39.865052 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:16:40.224388 kubelet[2201]: E1101 00:16:40.224317 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:40.484560 systemd[1]: run-containerd-runc-k8s.io-9d7e600a72ad604e6e555c21989a2e223edf57069646cd30e1b1bd749ae41b68-runc.06Emje.mount: Deactivated successfully. Nov 1 00:16:40.772199 sshd[4037]: Connection closed by authenticating user root 4.4.66.82 port 49738 [preauth] Nov 1 00:16:40.774963 systemd[1]: sshd@29-172.31.24.1:22-4.4.66.82:49738.service: Deactivated successfully. Nov 1 00:16:40.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.24.1:22-4.4.66.82:49738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:40.785518 kernel: audit: type=1131 audit(1761956200.773:895): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.24.1:22-4.4.66.82:49738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:40.910841 systemd[1]: Started sshd@30-172.31.24.1:22-4.4.66.82:57016.service. Nov 1 00:16:40.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.24.1:22-4.4.66.82:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:40.922549 kernel: audit: type=1130 audit(1761956200.910:896): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.24.1:22-4.4.66.82:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:41.225356 kubelet[2201]: E1101 00:16:41.225290 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:41.595776 sshd[4069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:41.595000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:41.605550 kernel: audit: type=1100 audit(1761956201.595:897): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:42.226486 kubelet[2201]: E1101 00:16:42.226418 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:42.913802 sshd[4069]: Failed password for root from 4.4.66.82 port 57016 ssh2 Nov 1 00:16:43.227170 kubelet[2201]: E1101 00:16:43.227130 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:43.560090 sshd[4069]: Connection closed by authenticating user root 4.4.66.82 port 57016 [preauth] Nov 1 00:16:43.562158 systemd[1]: sshd@30-172.31.24.1:22-4.4.66.82:57016.service: Deactivated successfully. Nov 1 00:16:43.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.24.1:22-4.4.66.82:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:43.572533 kernel: audit: type=1131 audit(1761956203.561:898): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.24.1:22-4.4.66.82:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:43.705721 systemd[1]: Started sshd@31-172.31.24.1:22-4.4.66.82:32994.service. Nov 1 00:16:43.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.24.1:22-4.4.66.82:32994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:43.715530 kernel: audit: type=1130 audit(1761956203.704:899): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.24.1:22-4.4.66.82:32994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:44.228918 kubelet[2201]: E1101 00:16:44.228851 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:44.409005 sshd[4093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:44.407000 audit[4093]: USER_AUTH pid=4093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:44.418516 kernel: audit: type=1100 audit(1761956204.407:900): pid=4093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:45.131997 kubelet[2201]: E1101 00:16:45.131953 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:45.233191 kubelet[2201]: E1101 00:16:45.232836 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:45.666973 kubelet[2201]: E1101 00:16:45.666737 2201 event.go:368] "Unable to write event (may retry after sleeping)" err="Patch \"https://172.31.27.146:6443/api/v1/namespaces/calico-system/events/csi-node-driver-9grks.1873b9c0ebbb8a97\": unexpected EOF" event="&Event{ObjectMeta:{csi-node-driver-9grks.1873b9c0ebbb8a97 calico-system 1610 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:csi-node-driver-9grks,UID:36aecd38-8986-4e27-8710-f1385049c6a9,APIVersion:v1,ResourceVersion:1005,FieldPath:spec.containers{calico-csi},},Reason:BackOff,Message:Back-off pulling image \"ghcr.io/flatcar/calico/csi:v3.30.4\",Source:EventSource{Component:kubelet,Host:172.31.24.1,},FirstTimestamp:2025-11-01 00:15:17 +0000 UTC,LastTimestamp:2025-11-01 00:16:24.367988903 +0000 UTC m=+99.987633400,Count:4,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.1,}" Nov 1 00:16:45.667550 kubelet[2201]: E1101 00:16:45.667467 2201 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": unexpected EOF" Nov 1 00:16:45.671264 kubelet[2201]: E1101 00:16:45.671189 2201 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": dial tcp 172.31.27.146:6443: connect: connection refused" Nov 1 00:16:45.672724 kubelet[2201]: E1101 00:16:45.672676 2201 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": dial tcp 172.31.27.146:6443: connect: connection refused" Nov 1 00:16:45.672957 kubelet[2201]: I1101 00:16:45.672928 2201 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Nov 1 00:16:45.673687 kubelet[2201]: E1101 00:16:45.673617 2201 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": dial tcp 172.31.27.146:6443: connect: connection refused" interval="200ms" Nov 1 00:16:45.875242 kubelet[2201]: E1101 00:16:45.875168 2201 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": dial tcp 172.31.27.146:6443: connect: connection refused" interval="400ms" Nov 1 00:16:46.234549 kubelet[2201]: E1101 00:16:46.234495 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:46.277000 kubelet[2201]: E1101 00:16:46.276956 2201 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": dial tcp 172.31.27.146:6443: connect: connection refused" interval="800ms" Nov 1 00:16:46.474578 sshd[4093]: Failed password for root from 4.4.66.82 port 32994 ssh2 Nov 1 00:16:46.673736 kubelet[2201]: I1101 00:16:46.673657 2201 status_manager.go:890] "Failed to get status for pod" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" pod="calico-system/csi-node-driver-9grks" err="Get \"https://172.31.27.146:6443/api/v1/namespaces/calico-system/pods/csi-node-driver-9grks\": dial tcp 172.31.27.146:6443: connect: connection refused - error from a previous attempt: unexpected EOF" Nov 1 00:16:46.677190 kubelet[2201]: I1101 00:16:46.677108 2201 status_manager.go:890] "Failed to get status for pod" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" pod="calico-system/csi-node-driver-9grks" err="Get \"https://172.31.27.146:6443/api/v1/namespaces/calico-system/pods/csi-node-driver-9grks\": dial tcp 172.31.27.146:6443: connect: connection refused" Nov 1 00:16:47.234981 kubelet[2201]: E1101 00:16:47.234938 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:48.211929 sshd[4093]: Connection closed by authenticating user root 4.4.66.82 port 32994 [preauth] Nov 1 00:16:48.214006 systemd[1]: sshd@31-172.31.24.1:22-4.4.66.82:32994.service: Deactivated successfully. Nov 1 00:16:48.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.24.1:22-4.4.66.82:32994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:48.224520 kernel: audit: type=1131 audit(1761956208.212:901): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.24.1:22-4.4.66.82:32994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:48.235856 kubelet[2201]: E1101 00:16:48.235781 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:48.345884 systemd[1]: Started sshd@32-172.31.24.1:22-4.4.66.82:40264.service. Nov 1 00:16:48.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.31.24.1:22-4.4.66.82:40264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:48.357526 kernel: audit: type=1130 audit(1761956208.344:902): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.31.24.1:22-4.4.66.82:40264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:49.032407 sshd[4131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:49.031000 audit[4131]: USER_AUTH pid=4131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:49.042529 kernel: audit: type=1100 audit(1761956209.031:903): pid=4131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:49.235977 kubelet[2201]: E1101 00:16:49.235927 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:50.236308 kubelet[2201]: E1101 00:16:50.236268 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:50.781831 sshd[4131]: Failed password for root from 4.4.66.82 port 40264 ssh2 Nov 1 00:16:50.996610 sshd[4131]: Connection closed by authenticating user root 4.4.66.82 port 40264 [preauth] Nov 1 00:16:50.999592 systemd[1]: sshd@32-172.31.24.1:22-4.4.66.82:40264.service: Deactivated successfully. Nov 1 00:16:50.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.31.24.1:22-4.4.66.82:40264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:51.009565 kernel: audit: type=1131 audit(1761956210.998:904): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.31.24.1:22-4.4.66.82:40264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:51.135654 systemd[1]: Started sshd@33-172.31.24.1:22-4.4.66.82:44620.service. Nov 1 00:16:51.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-172.31.24.1:22-4.4.66.82:44620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:51.148542 kernel: audit: type=1130 audit(1761956211.134:905): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-172.31.24.1:22-4.4.66.82:44620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:51.237337 kubelet[2201]: E1101 00:16:51.237247 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:51.369249 kubelet[2201]: E1101 00:16:51.369173 2201 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-9grks" podUID="36aecd38-8986-4e27-8710-f1385049c6a9" Nov 1 00:16:51.828290 sshd[4135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:51.827000 audit[4135]: USER_AUTH pid=4135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:51.838615 kernel: audit: type=1100 audit(1761956211.827:906): pid=4135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:52.237778 kubelet[2201]: E1101 00:16:52.237700 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:53.238307 kubelet[2201]: E1101 00:16:53.238241 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:54.185112 sshd[4135]: Failed password for root from 4.4.66.82 port 44620 ssh2 Nov 1 00:16:54.239254 kubelet[2201]: E1101 00:16:54.239187 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:55.240008 kubelet[2201]: E1101 00:16:55.239938 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:55.629551 sshd[4135]: Connection closed by authenticating user root 4.4.66.82 port 44620 [preauth] Nov 1 00:16:55.631221 systemd[1]: sshd@33-172.31.24.1:22-4.4.66.82:44620.service: Deactivated successfully. Nov 1 00:16:55.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-172.31.24.1:22-4.4.66.82:44620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:55.641640 kernel: audit: type=1131 audit(1761956215.630:907): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-172.31.24.1:22-4.4.66.82:44620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:55.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-172.31.24.1:22-4.4.66.82:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:55.764958 systemd[1]: Started sshd@34-172.31.24.1:22-4.4.66.82:51726.service. Nov 1 00:16:55.775530 kernel: audit: type=1130 audit(1761956215.763:908): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-172.31.24.1:22-4.4.66.82:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:16:56.240523 kubelet[2201]: E1101 00:16:56.240428 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:56.442144 sshd[4141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:16:56.441000 audit[4141]: USER_AUTH pid=4141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:56.452581 kernel: audit: type=1100 audit(1761956216.441:909): pid=4141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:16:57.078632 kubelet[2201]: E1101 00:16:57.078566 2201 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.24.1?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Nov 1 00:16:57.241055 kubelet[2201]: E1101 00:16:57.240989 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:58.241158 kubelet[2201]: E1101 00:16:58.241115 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:58.487452 sshd[4141]: Failed password for root from 4.4.66.82 port 51726 ssh2 Nov 1 00:16:59.242228 kubelet[2201]: E1101 00:16:59.242155 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:00.238424 sshd[4141]: Connection closed by authenticating user root 4.4.66.82 port 51726 [preauth] Nov 1 00:17:00.241747 systemd[1]: sshd@34-172.31.24.1:22-4.4.66.82:51726.service: Deactivated successfully. Nov 1 00:17:00.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-172.31.24.1:22-4.4.66.82:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:17:00.244185 kubelet[2201]: E1101 00:17:00.243761 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:00.251617 kernel: audit: type=1131 audit(1761956220.240:910): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-172.31.24.1:22-4.4.66.82:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:17:00.374970 systemd[1]: Started sshd@35-172.31.24.1:22-4.4.66.82:58884.service. Nov 1 00:17:00.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-172.31.24.1:22-4.4.66.82:58884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:17:00.386543 kernel: audit: type=1130 audit(1761956220.373:911): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-172.31.24.1:22-4.4.66.82:58884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:17:01.050274 sshd[4145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.4.66.82 user=root Nov 1 00:17:01.049000 audit[4145]: USER_AUTH pid=4145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:17:01.060533 kernel: audit: type=1100 audit(1761956221.049:912): pid=4145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=4.4.66.82 addr=4.4.66.82 terminal=ssh res=failed' Nov 1 00:17:01.244189 kubelet[2201]: E1101 00:17:01.244111 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"