Nov 1 00:14:31.014488 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Nov 1 00:14:31.014524 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Oct 31 23:12:38 -00 2025 Nov 1 00:14:31.014546 kernel: efi: EFI v2.70 by EDK II Nov 1 00:14:31.014562 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Nov 1 00:14:31.014575 kernel: ACPI: Early table checksum verification disabled Nov 1 00:14:31.014589 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Nov 1 00:14:31.014605 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Nov 1 00:14:31.014620 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Nov 1 00:14:31.014634 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Nov 1 00:14:31.014647 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Nov 1 00:14:31.014665 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Nov 1 00:14:31.014679 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Nov 1 00:14:31.014694 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Nov 1 00:14:31.014708 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Nov 1 00:14:31.014725 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Nov 1 00:14:31.014744 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Nov 1 00:14:31.014758 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Nov 1 00:14:31.014773 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Nov 1 00:14:31.014787 kernel: printk: bootconsole [uart0] enabled Nov 1 00:14:31.014802 kernel: NUMA: Failed to initialise from firmware Nov 1 00:14:31.014817 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Nov 1 00:14:31.014832 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Nov 1 00:14:31.014846 kernel: Zone ranges: Nov 1 00:14:31.014861 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Nov 1 00:14:31.014875 kernel: DMA32 empty Nov 1 00:14:31.014890 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Nov 1 00:14:31.014908 kernel: Movable zone start for each node Nov 1 00:14:31.014923 kernel: Early memory node ranges Nov 1 00:14:31.014938 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Nov 1 00:14:31.014952 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Nov 1 00:14:31.014967 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Nov 1 00:14:31.014981 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Nov 1 00:14:31.014996 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Nov 1 00:14:31.015010 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Nov 1 00:14:31.015025 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Nov 1 00:14:31.015039 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Nov 1 00:14:31.015053 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Nov 1 00:14:31.017108 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Nov 1 00:14:31.017135 kernel: psci: probing for conduit method from ACPI. Nov 1 00:14:31.017151 kernel: psci: PSCIv1.0 detected in firmware. Nov 1 00:14:31.017172 kernel: psci: Using standard PSCI v0.2 function IDs Nov 1 00:14:31.017188 kernel: psci: Trusted OS migration not required Nov 1 00:14:31.017204 kernel: psci: SMC Calling Convention v1.1 Nov 1 00:14:31.017224 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Nov 1 00:14:31.017239 kernel: ACPI: SRAT not present Nov 1 00:14:31.017255 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Nov 1 00:14:31.017270 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Nov 1 00:14:31.017286 kernel: pcpu-alloc: [0] 0 [0] 1 Nov 1 00:14:31.017302 kernel: Detected PIPT I-cache on CPU0 Nov 1 00:14:31.017317 kernel: CPU features: detected: GIC system register CPU interface Nov 1 00:14:31.017332 kernel: CPU features: detected: Spectre-v2 Nov 1 00:14:31.017348 kernel: CPU features: detected: Spectre-v3a Nov 1 00:14:31.017363 kernel: CPU features: detected: Spectre-BHB Nov 1 00:14:31.017378 kernel: CPU features: kernel page table isolation forced ON by KASLR Nov 1 00:14:31.017398 kernel: CPU features: detected: Kernel page table isolation (KPTI) Nov 1 00:14:31.017413 kernel: CPU features: detected: ARM erratum 1742098 Nov 1 00:14:31.017428 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Nov 1 00:14:31.017444 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Nov 1 00:14:31.017459 kernel: Policy zone: Normal Nov 1 00:14:31.017477 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=284392058f112e827cd7c521dcce1be27e1367d0030df494642d12e41e342e29 Nov 1 00:14:31.017493 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:14:31.017509 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Nov 1 00:14:31.017524 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:14:31.017539 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:14:31.017559 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Nov 1 00:14:31.017575 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Nov 1 00:14:31.017591 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Nov 1 00:14:31.017606 kernel: trace event string verifier disabled Nov 1 00:14:31.017622 kernel: rcu: Preemptible hierarchical RCU implementation. Nov 1 00:14:31.017638 kernel: rcu: RCU event tracing is enabled. Nov 1 00:14:31.017654 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Nov 1 00:14:31.017670 kernel: Trampoline variant of Tasks RCU enabled. Nov 1 00:14:31.017686 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:14:31.017701 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:14:31.017717 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Nov 1 00:14:31.017732 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Nov 1 00:14:31.017751 kernel: GICv3: 96 SPIs implemented Nov 1 00:14:31.017766 kernel: GICv3: 0 Extended SPIs implemented Nov 1 00:14:31.017781 kernel: GICv3: Distributor has no Range Selector support Nov 1 00:14:31.017796 kernel: Root IRQ handler: gic_handle_irq Nov 1 00:14:31.017811 kernel: GICv3: 16 PPIs implemented Nov 1 00:14:31.017826 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Nov 1 00:14:31.017841 kernel: ACPI: SRAT not present Nov 1 00:14:31.017856 kernel: ITS [mem 0x10080000-0x1009ffff] Nov 1 00:14:31.017871 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Nov 1 00:14:31.017887 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Nov 1 00:14:31.017902 kernel: GICv3: using LPI property table @0x00000004000b0000 Nov 1 00:14:31.017921 kernel: ITS: Using hypervisor restricted LPI range [128] Nov 1 00:14:31.017936 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Nov 1 00:14:31.017951 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Nov 1 00:14:31.017967 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Nov 1 00:14:31.017982 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Nov 1 00:14:31.017998 kernel: Console: colour dummy device 80x25 Nov 1 00:14:31.018013 kernel: printk: console [tty1] enabled Nov 1 00:14:31.018029 kernel: ACPI: Core revision 20210730 Nov 1 00:14:31.018045 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Nov 1 00:14:31.018079 kernel: pid_max: default: 32768 minimum: 301 Nov 1 00:14:31.018117 kernel: LSM: Security Framework initializing Nov 1 00:14:31.018137 kernel: SELinux: Initializing. Nov 1 00:14:31.018153 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Nov 1 00:14:31.018169 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Nov 1 00:14:31.018185 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:14:31.018201 kernel: Platform MSI: ITS@0x10080000 domain created Nov 1 00:14:31.018216 kernel: PCI/MSI: ITS@0x10080000 domain created Nov 1 00:14:31.018232 kernel: Remapping and enabling EFI services. Nov 1 00:14:31.018247 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:14:31.018263 kernel: Detected PIPT I-cache on CPU1 Nov 1 00:14:31.018284 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Nov 1 00:14:31.018300 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Nov 1 00:14:31.018317 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Nov 1 00:14:31.018332 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 00:14:31.018348 kernel: SMP: Total of 2 processors activated. Nov 1 00:14:31.018363 kernel: CPU features: detected: 32-bit EL0 Support Nov 1 00:14:31.018379 kernel: CPU features: detected: 32-bit EL1 Support Nov 1 00:14:31.018394 kernel: CPU features: detected: CRC32 instructions Nov 1 00:14:31.018409 kernel: CPU: All CPU(s) started at EL1 Nov 1 00:14:31.018429 kernel: alternatives: patching kernel code Nov 1 00:14:31.018445 kernel: devtmpfs: initialized Nov 1 00:14:31.018470 kernel: KASLR disabled due to lack of seed Nov 1 00:14:31.018491 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:14:31.018507 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Nov 1 00:14:31.018523 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:14:31.018540 kernel: SMBIOS 3.0.0 present. Nov 1 00:14:31.018556 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Nov 1 00:14:31.018572 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:14:31.018588 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Nov 1 00:14:31.018605 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Nov 1 00:14:31.018626 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Nov 1 00:14:31.018642 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:14:31.018658 kernel: audit: type=2000 audit(0.293:1): state=initialized audit_enabled=0 res=1 Nov 1 00:14:31.018675 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:14:31.018691 kernel: cpuidle: using governor menu Nov 1 00:14:31.018711 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Nov 1 00:14:31.018728 kernel: ASID allocator initialised with 32768 entries Nov 1 00:14:31.018744 kernel: ACPI: bus type PCI registered Nov 1 00:14:31.018760 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:14:31.018776 kernel: Serial: AMBA PL011 UART driver Nov 1 00:14:31.018792 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 00:14:31.018809 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Nov 1 00:14:31.018825 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:14:31.018841 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Nov 1 00:14:31.018860 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:14:31.018877 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Nov 1 00:14:31.018893 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:14:31.018909 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:14:31.018925 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:14:31.018941 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:14:31.018957 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:14:31.018973 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:14:31.018990 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 1 00:14:31.019006 kernel: ACPI: Interpreter enabled Nov 1 00:14:31.019026 kernel: ACPI: Using GIC for interrupt routing Nov 1 00:14:31.019042 kernel: ACPI: MCFG table detected, 1 entries Nov 1 00:14:31.019058 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Nov 1 00:14:31.021396 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Nov 1 00:14:31.021594 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Nov 1 00:14:31.021788 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Nov 1 00:14:31.021979 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Nov 1 00:14:31.022206 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Nov 1 00:14:31.022231 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Nov 1 00:14:31.022249 kernel: acpiphp: Slot [1] registered Nov 1 00:14:31.022266 kernel: acpiphp: Slot [2] registered Nov 1 00:14:31.022282 kernel: acpiphp: Slot [3] registered Nov 1 00:14:31.022298 kernel: acpiphp: Slot [4] registered Nov 1 00:14:31.022315 kernel: acpiphp: Slot [5] registered Nov 1 00:14:31.022331 kernel: acpiphp: Slot [6] registered Nov 1 00:14:31.022347 kernel: acpiphp: Slot [7] registered Nov 1 00:14:31.022368 kernel: acpiphp: Slot [8] registered Nov 1 00:14:31.022384 kernel: acpiphp: Slot [9] registered Nov 1 00:14:31.022400 kernel: acpiphp: Slot [10] registered Nov 1 00:14:31.022417 kernel: acpiphp: Slot [11] registered Nov 1 00:14:31.022433 kernel: acpiphp: Slot [12] registered Nov 1 00:14:31.022449 kernel: acpiphp: Slot [13] registered Nov 1 00:14:31.022465 kernel: acpiphp: Slot [14] registered Nov 1 00:14:31.022481 kernel: acpiphp: Slot [15] registered Nov 1 00:14:31.022497 kernel: acpiphp: Slot [16] registered Nov 1 00:14:31.022517 kernel: acpiphp: Slot [17] registered Nov 1 00:14:31.022533 kernel: acpiphp: Slot [18] registered Nov 1 00:14:31.022549 kernel: acpiphp: Slot [19] registered Nov 1 00:14:31.022565 kernel: acpiphp: Slot [20] registered Nov 1 00:14:31.022581 kernel: acpiphp: Slot [21] registered Nov 1 00:14:31.022597 kernel: acpiphp: Slot [22] registered Nov 1 00:14:31.022613 kernel: acpiphp: Slot [23] registered Nov 1 00:14:31.022630 kernel: acpiphp: Slot [24] registered Nov 1 00:14:31.022645 kernel: acpiphp: Slot [25] registered Nov 1 00:14:31.022661 kernel: acpiphp: Slot [26] registered Nov 1 00:14:31.022682 kernel: acpiphp: Slot [27] registered Nov 1 00:14:31.022698 kernel: acpiphp: Slot [28] registered Nov 1 00:14:31.022714 kernel: acpiphp: Slot [29] registered Nov 1 00:14:31.022730 kernel: acpiphp: Slot [30] registered Nov 1 00:14:31.022746 kernel: acpiphp: Slot [31] registered Nov 1 00:14:31.022762 kernel: PCI host bridge to bus 0000:00 Nov 1 00:14:31.022955 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Nov 1 00:14:31.023157 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Nov 1 00:14:31.023339 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Nov 1 00:14:31.023514 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Nov 1 00:14:31.023745 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Nov 1 00:14:31.023957 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Nov 1 00:14:31.024198 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Nov 1 00:14:31.024407 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Nov 1 00:14:31.024610 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Nov 1 00:14:31.024806 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Nov 1 00:14:31.025014 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Nov 1 00:14:31.035966 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Nov 1 00:14:31.036246 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Nov 1 00:14:31.036454 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Nov 1 00:14:31.036656 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Nov 1 00:14:31.036867 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Nov 1 00:14:31.037086 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Nov 1 00:14:31.037300 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Nov 1 00:14:31.037495 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Nov 1 00:14:31.037702 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Nov 1 00:14:31.037892 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Nov 1 00:14:31.038091 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Nov 1 00:14:31.038284 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Nov 1 00:14:31.038307 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Nov 1 00:14:31.038325 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Nov 1 00:14:31.038342 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Nov 1 00:14:31.038360 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Nov 1 00:14:31.038376 kernel: iommu: Default domain type: Translated Nov 1 00:14:31.038393 kernel: iommu: DMA domain TLB invalidation policy: strict mode Nov 1 00:14:31.038409 kernel: vgaarb: loaded Nov 1 00:14:31.038425 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:14:31.038447 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:14:31.038464 kernel: PTP clock support registered Nov 1 00:14:31.038480 kernel: Registered efivars operations Nov 1 00:14:31.038496 kernel: clocksource: Switched to clocksource arch_sys_counter Nov 1 00:14:31.038513 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:14:31.038529 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:14:31.038545 kernel: pnp: PnP ACPI init Nov 1 00:14:31.038749 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Nov 1 00:14:31.038778 kernel: pnp: PnP ACPI: found 1 devices Nov 1 00:14:31.038795 kernel: NET: Registered PF_INET protocol family Nov 1 00:14:31.038812 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Nov 1 00:14:31.038829 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Nov 1 00:14:31.038846 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:14:31.038863 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 1 00:14:31.038879 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Nov 1 00:14:31.038896 kernel: TCP: Hash tables configured (established 32768 bind 32768) Nov 1 00:14:31.038912 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Nov 1 00:14:31.038933 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Nov 1 00:14:31.038949 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:14:31.038966 kernel: PCI: CLS 0 bytes, default 64 Nov 1 00:14:31.057151 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Nov 1 00:14:31.057178 kernel: kvm [1]: HYP mode not available Nov 1 00:14:31.057197 kernel: Initialise system trusted keyrings Nov 1 00:14:31.057215 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Nov 1 00:14:31.057232 kernel: Key type asymmetric registered Nov 1 00:14:31.057249 kernel: Asymmetric key parser 'x509' registered Nov 1 00:14:31.057276 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:14:31.057294 kernel: io scheduler mq-deadline registered Nov 1 00:14:31.057310 kernel: io scheduler kyber registered Nov 1 00:14:31.057327 kernel: io scheduler bfq registered Nov 1 00:14:31.057601 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Nov 1 00:14:31.057628 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Nov 1 00:14:31.057646 kernel: ACPI: button: Power Button [PWRB] Nov 1 00:14:31.057663 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Nov 1 00:14:31.057680 kernel: ACPI: button: Sleep Button [SLPB] Nov 1 00:14:31.057702 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:14:31.057720 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Nov 1 00:14:31.057927 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Nov 1 00:14:31.057953 kernel: printk: console [ttyS0] disabled Nov 1 00:14:31.057970 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Nov 1 00:14:31.057987 kernel: printk: console [ttyS0] enabled Nov 1 00:14:31.058004 kernel: printk: bootconsole [uart0] disabled Nov 1 00:14:31.058020 kernel: thunder_xcv, ver 1.0 Nov 1 00:14:31.058036 kernel: thunder_bgx, ver 1.0 Nov 1 00:14:31.058058 kernel: nicpf, ver 1.0 Nov 1 00:14:31.058106 kernel: nicvf, ver 1.0 Nov 1 00:14:31.058324 kernel: rtc-efi rtc-efi.0: registered as rtc0 Nov 1 00:14:31.058514 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-11-01T00:14:30 UTC (1761956070) Nov 1 00:14:31.058537 kernel: hid: raw HID events driver (C) Jiri Kosina Nov 1 00:14:31.058555 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:14:31.058571 kernel: Segment Routing with IPv6 Nov 1 00:14:31.058588 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:14:31.058612 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:14:31.058629 kernel: Key type dns_resolver registered Nov 1 00:14:31.058645 kernel: registered taskstats version 1 Nov 1 00:14:31.058662 kernel: Loading compiled-in X.509 certificates Nov 1 00:14:31.058680 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 4aa5071b9a6f96878595e36d4bd5862a671c915d' Nov 1 00:14:31.058696 kernel: Key type .fscrypt registered Nov 1 00:14:31.058712 kernel: Key type fscrypt-provisioning registered Nov 1 00:14:31.058728 kernel: ima: No TPM chip found, activating TPM-bypass! Nov 1 00:14:31.058745 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:14:31.058765 kernel: ima: No architecture policies found Nov 1 00:14:31.058782 kernel: clk: Disabling unused clocks Nov 1 00:14:31.058798 kernel: Freeing unused kernel memory: 36416K Nov 1 00:14:31.058814 kernel: Run /init as init process Nov 1 00:14:31.058830 kernel: with arguments: Nov 1 00:14:31.058846 kernel: /init Nov 1 00:14:31.058862 kernel: with environment: Nov 1 00:14:31.058878 kernel: HOME=/ Nov 1 00:14:31.058894 kernel: TERM=linux Nov 1 00:14:31.058914 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:14:31.058935 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:14:31.058956 systemd[1]: Detected virtualization amazon. Nov 1 00:14:31.058974 systemd[1]: Detected architecture arm64. Nov 1 00:14:31.058991 systemd[1]: Running in initrd. Nov 1 00:14:31.059009 systemd[1]: No hostname configured, using default hostname. Nov 1 00:14:31.059026 systemd[1]: Hostname set to . Nov 1 00:14:31.059048 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:14:31.059090 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:14:31.059111 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:14:31.059129 systemd[1]: Reached target cryptsetup.target. Nov 1 00:14:31.059146 systemd[1]: Reached target paths.target. Nov 1 00:14:31.059164 systemd[1]: Reached target slices.target. Nov 1 00:14:31.059182 systemd[1]: Reached target swap.target. Nov 1 00:14:31.059199 systemd[1]: Reached target timers.target. Nov 1 00:14:31.059223 systemd[1]: Listening on iscsid.socket. Nov 1 00:14:31.059241 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:14:31.059259 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:14:31.059277 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:14:31.059294 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:14:31.059312 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:14:31.059329 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:14:31.059347 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:14:31.059368 systemd[1]: Reached target sockets.target. Nov 1 00:14:31.059386 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:14:31.059404 systemd[1]: Finished network-cleanup.service. Nov 1 00:14:31.059421 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:14:31.059439 systemd[1]: Starting systemd-journald.service... Nov 1 00:14:31.059456 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:14:31.059474 systemd[1]: Starting systemd-resolved.service... Nov 1 00:14:31.059491 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:14:31.059509 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:14:31.059531 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:14:31.059549 kernel: audit: type=1130 audit(1761956070.999:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.059568 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:14:31.059586 kernel: audit: type=1130 audit(1761956071.024:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.059604 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:14:31.059621 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:14:31.059642 systemd-journald[310]: Journal started Nov 1 00:14:31.059738 systemd-journald[310]: Runtime Journal (/run/log/journal/ec26953699095f2ccc5ca5850104b3ad) is 8.0M, max 75.4M, 67.4M free. Nov 1 00:14:30.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:30.988310 systemd-modules-load[311]: Inserted module 'overlay' Nov 1 00:14:31.093111 systemd[1]: Started systemd-journald.service. Nov 1 00:14:31.093155 kernel: audit: type=1130 audit(1761956071.071:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.093182 kernel: audit: type=1130 audit(1761956071.083:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.073248 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:14:31.103947 systemd-resolved[312]: Positive Trust Anchors: Nov 1 00:14:31.103976 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:14:31.104036 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:14:31.112590 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:14:31.120371 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:14:31.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.121793 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:14:31.141549 systemd-modules-load[311]: Inserted module 'br_netfilter' Nov 1 00:14:31.145739 kernel: audit: type=1130 audit(1761956071.119:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.145775 kernel: Bridge firewalling registered Nov 1 00:14:31.152900 dracut-cmdline[327]: dracut-dracut-053 Nov 1 00:14:31.162284 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=284392058f112e827cd7c521dcce1be27e1367d0030df494642d12e41e342e29 Nov 1 00:14:31.190103 kernel: SCSI subsystem initialized Nov 1 00:14:31.212224 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:14:31.212292 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:14:31.216532 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:14:31.225441 systemd-modules-load[311]: Inserted module 'dm_multipath' Nov 1 00:14:31.230761 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:14:31.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.246973 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:14:31.256080 kernel: audit: type=1130 audit(1761956071.237:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.275252 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:14:31.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.292003 kernel: audit: type=1130 audit(1761956071.281:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.361099 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:14:31.381098 kernel: iscsi: registered transport (tcp) Nov 1 00:14:31.409355 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:14:31.409438 kernel: QLogic iSCSI HBA Driver Nov 1 00:14:31.613097 kernel: random: crng init done Nov 1 00:14:31.613442 systemd-resolved[312]: Defaulting to hostname 'linux'. Nov 1 00:14:31.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.618700 systemd[1]: Started systemd-resolved.service. Nov 1 00:14:31.639542 kernel: audit: type=1130 audit(1761956071.621:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.623094 systemd[1]: Reached target nss-lookup.target. Nov 1 00:14:31.639392 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:14:31.653093 kernel: audit: type=1130 audit(1761956071.644:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:31.647141 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:14:31.714100 kernel: raid6: neonx8 gen() 6247 MB/s Nov 1 00:14:31.732107 kernel: raid6: neonx8 xor() 4768 MB/s Nov 1 00:14:31.750089 kernel: raid6: neonx4 gen() 6580 MB/s Nov 1 00:14:31.768106 kernel: raid6: neonx4 xor() 5001 MB/s Nov 1 00:14:31.786089 kernel: raid6: neonx2 gen() 5783 MB/s Nov 1 00:14:31.804106 kernel: raid6: neonx2 xor() 4583 MB/s Nov 1 00:14:31.822098 kernel: raid6: neonx1 gen() 4488 MB/s Nov 1 00:14:31.840106 kernel: raid6: neonx1 xor() 3709 MB/s Nov 1 00:14:31.858094 kernel: raid6: int64x8 gen() 3443 MB/s Nov 1 00:14:31.876105 kernel: raid6: int64x8 xor() 2092 MB/s Nov 1 00:14:31.894094 kernel: raid6: int64x4 gen() 3837 MB/s Nov 1 00:14:31.912106 kernel: raid6: int64x4 xor() 2202 MB/s Nov 1 00:14:31.930095 kernel: raid6: int64x2 gen() 3607 MB/s Nov 1 00:14:31.948108 kernel: raid6: int64x2 xor() 1954 MB/s Nov 1 00:14:31.966095 kernel: raid6: int64x1 gen() 2764 MB/s Nov 1 00:14:31.985697 kernel: raid6: int64x1 xor() 1454 MB/s Nov 1 00:14:31.985727 kernel: raid6: using algorithm neonx4 gen() 6580 MB/s Nov 1 00:14:31.985751 kernel: raid6: .... xor() 5001 MB/s, rmw enabled Nov 1 00:14:31.987603 kernel: raid6: using neon recovery algorithm Nov 1 00:14:32.006101 kernel: xor: measuring software checksum speed Nov 1 00:14:32.008107 kernel: 8regs : 8784 MB/sec Nov 1 00:14:32.010095 kernel: 32regs : 10101 MB/sec Nov 1 00:14:32.013832 kernel: arm64_neon : 9053 MB/sec Nov 1 00:14:32.013863 kernel: xor: using function: 32regs (10101 MB/sec) Nov 1 00:14:32.110112 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Nov 1 00:14:32.127454 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:14:32.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:32.131000 audit: BPF prog-id=7 op=LOAD Nov 1 00:14:32.131000 audit: BPF prog-id=8 op=LOAD Nov 1 00:14:32.133269 systemd[1]: Starting systemd-udevd.service... Nov 1 00:14:32.163495 systemd-udevd[509]: Using default interface naming scheme 'v252'. Nov 1 00:14:32.172539 systemd[1]: Started systemd-udevd.service. Nov 1 00:14:32.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:32.186453 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:14:32.217310 dracut-pre-trigger[527]: rd.md=0: removing MD RAID activation Nov 1 00:14:32.274841 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:14:32.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:32.281588 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:14:32.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:32.379104 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:14:32.487641 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Nov 1 00:14:32.487704 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Nov 1 00:14:32.505582 kernel: ena 0000:00:05.0: ENA device version: 0.10 Nov 1 00:14:32.505819 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Nov 1 00:14:32.506039 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:c1:92:00:88:d7 Nov 1 00:14:32.508676 (udev-worker)[561]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:14:32.538817 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Nov 1 00:14:32.538878 kernel: nvme nvme0: pci function 0000:00:04.0 Nov 1 00:14:32.548111 kernel: nvme nvme0: 2/0/0 default/read/poll queues Nov 1 00:14:32.558691 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 1 00:14:32.558739 kernel: GPT:9289727 != 33554431 Nov 1 00:14:32.558763 kernel: GPT:Alternate GPT header not at the end of the disk. Nov 1 00:14:32.560958 kernel: GPT:9289727 != 33554431 Nov 1 00:14:32.562327 kernel: GPT: Use GNU Parted to correct GPT errors. Nov 1 00:14:32.564249 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:14:32.640138 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (563) Nov 1 00:14:32.677169 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:14:32.704128 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:14:32.730424 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:14:32.745241 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:14:32.768321 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:14:32.794147 systemd[1]: Starting disk-uuid.service... Nov 1 00:14:32.808741 disk-uuid[668]: Primary Header is updated. Nov 1 00:14:32.808741 disk-uuid[668]: Secondary Entries is updated. Nov 1 00:14:32.808741 disk-uuid[668]: Secondary Header is updated. Nov 1 00:14:32.822809 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:14:32.826094 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:14:32.835137 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:14:33.835141 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:14:33.836117 disk-uuid[669]: The operation has completed successfully. Nov 1 00:14:34.010801 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:14:34.013582 systemd[1]: Finished disk-uuid.service. Nov 1 00:14:34.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.028786 systemd[1]: Starting verity-setup.service... Nov 1 00:14:34.066114 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Nov 1 00:14:34.160431 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:14:34.164698 systemd[1]: Finished verity-setup.service. Nov 1 00:14:34.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.170002 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:14:34.264117 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:14:34.265294 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:14:34.265631 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 00:14:34.266840 systemd[1]: Starting ignition-setup.service... Nov 1 00:14:34.279607 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:14:34.301567 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:14:34.301636 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:14:34.304207 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:14:34.345110 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:14:34.364370 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 00:14:34.379797 systemd[1]: Finished ignition-setup.service. Nov 1 00:14:34.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.383648 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:14:34.431801 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:14:34.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.436000 audit: BPF prog-id=9 op=LOAD Nov 1 00:14:34.438711 systemd[1]: Starting systemd-networkd.service... Nov 1 00:14:34.488039 systemd-networkd[1191]: lo: Link UP Nov 1 00:14:34.490250 systemd-networkd[1191]: lo: Gained carrier Nov 1 00:14:34.497248 systemd-networkd[1191]: Enumeration completed Nov 1 00:14:34.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.497720 systemd-networkd[1191]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:14:34.497935 systemd[1]: Started systemd-networkd.service. Nov 1 00:14:34.500338 systemd[1]: Reached target network.target. Nov 1 00:14:34.503451 systemd[1]: Starting iscsiuio.service... Nov 1 00:14:34.523240 systemd[1]: Started iscsiuio.service. Nov 1 00:14:34.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.534717 systemd[1]: Starting iscsid.service... Nov 1 00:14:34.537016 systemd-networkd[1191]: eth0: Link UP Nov 1 00:14:34.537024 systemd-networkd[1191]: eth0: Gained carrier Nov 1 00:14:34.548267 systemd-networkd[1191]: eth0: DHCPv4 address 172.31.29.96/20, gateway 172.31.16.1 acquired from 172.31.16.1 Nov 1 00:14:34.552453 iscsid[1197]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:14:34.552453 iscsid[1197]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:14:34.552453 iscsid[1197]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:14:34.552453 iscsid[1197]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:14:34.552453 iscsid[1197]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:14:34.578139 iscsid[1197]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:14:34.587872 systemd[1]: Started iscsid.service. Nov 1 00:14:34.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.592982 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:14:34.619423 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:14:34.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:34.623921 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:14:34.626167 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:14:34.628475 systemd[1]: Reached target remote-fs.target. Nov 1 00:14:34.634578 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:14:34.659366 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:14:34.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.167518 ignition[1157]: Ignition 2.14.0 Nov 1 00:14:35.167547 ignition[1157]: Stage: fetch-offline Nov 1 00:14:35.168227 ignition[1157]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:35.168453 ignition[1157]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:35.191211 ignition[1157]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:35.192137 ignition[1157]: Ignition finished successfully Nov 1 00:14:35.214500 kernel: kauditd_printk_skb: 17 callbacks suppressed Nov 1 00:14:35.214538 kernel: audit: type=1130 audit(1761956075.198:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.195900 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:14:35.216282 systemd[1]: Starting ignition-fetch.service... Nov 1 00:14:35.233102 ignition[1216]: Ignition 2.14.0 Nov 1 00:14:35.233129 ignition[1216]: Stage: fetch Nov 1 00:14:35.233423 ignition[1216]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:35.233481 ignition[1216]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:35.247794 ignition[1216]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:35.251562 ignition[1216]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:35.257280 ignition[1216]: INFO : PUT result: OK Nov 1 00:14:35.261046 ignition[1216]: DEBUG : parsed url from cmdline: "" Nov 1 00:14:35.268234 ignition[1216]: INFO : no config URL provided Nov 1 00:14:35.268234 ignition[1216]: INFO : reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:14:35.268234 ignition[1216]: INFO : no config at "/usr/lib/ignition/user.ign" Nov 1 00:14:35.268234 ignition[1216]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:35.279152 ignition[1216]: INFO : PUT result: OK Nov 1 00:14:35.279152 ignition[1216]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Nov 1 00:14:35.284677 ignition[1216]: INFO : GET result: OK Nov 1 00:14:35.286746 ignition[1216]: DEBUG : parsing config with SHA512: fe37ffc4b2fbb18021a6037eded46d29be7b64b3bd99a0da0031a241fe8e362465db7160eb173543d60e0b18187b4729eeeb81997867534c4034280613977c68 Nov 1 00:14:35.296357 unknown[1216]: fetched base config from "system" Nov 1 00:14:35.296387 unknown[1216]: fetched base config from "system" Nov 1 00:14:35.296402 unknown[1216]: fetched user config from "aws" Nov 1 00:14:35.303488 ignition[1216]: fetch: fetch complete Nov 1 00:14:35.303514 ignition[1216]: fetch: fetch passed Nov 1 00:14:35.305193 ignition[1216]: Ignition finished successfully Nov 1 00:14:35.307997 systemd[1]: Finished ignition-fetch.service. Nov 1 00:14:35.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.317291 systemd[1]: Starting ignition-kargs.service... Nov 1 00:14:35.332301 kernel: audit: type=1130 audit(1761956075.311:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.339234 ignition[1222]: Ignition 2.14.0 Nov 1 00:14:35.339261 ignition[1222]: Stage: kargs Nov 1 00:14:35.339564 ignition[1222]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:35.339623 ignition[1222]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:35.356580 ignition[1222]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:35.359585 ignition[1222]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:35.363436 ignition[1222]: INFO : PUT result: OK Nov 1 00:14:35.368597 ignition[1222]: kargs: kargs passed Nov 1 00:14:35.368695 ignition[1222]: Ignition finished successfully Nov 1 00:14:35.373964 systemd[1]: Finished ignition-kargs.service. Nov 1 00:14:35.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.379351 systemd[1]: Starting ignition-disks.service... Nov 1 00:14:35.389478 kernel: audit: type=1130 audit(1761956075.376:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.397034 ignition[1228]: Ignition 2.14.0 Nov 1 00:14:35.399089 ignition[1228]: Stage: disks Nov 1 00:14:35.400896 ignition[1228]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:35.403873 ignition[1228]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:35.414650 ignition[1228]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:35.417545 ignition[1228]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:35.421225 ignition[1228]: INFO : PUT result: OK Nov 1 00:14:35.425670 ignition[1228]: disks: disks passed Nov 1 00:14:35.425769 ignition[1228]: Ignition finished successfully Nov 1 00:14:35.430974 systemd[1]: Finished ignition-disks.service. Nov 1 00:14:35.442479 kernel: audit: type=1130 audit(1761956075.432:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.433427 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:14:35.444935 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:14:35.451211 systemd[1]: Reached target local-fs.target. Nov 1 00:14:35.454980 systemd[1]: Reached target sysinit.target. Nov 1 00:14:35.457053 systemd[1]: Reached target basic.target. Nov 1 00:14:35.463983 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:14:35.507346 systemd-fsck[1236]: ROOT: clean, 637/553520 files, 56031/553472 blocks Nov 1 00:14:35.516879 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:14:35.534327 kernel: audit: type=1130 audit(1761956075.516:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.520504 systemd[1]: Mounting sysroot.mount... Nov 1 00:14:35.554090 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:14:35.556161 systemd[1]: Mounted sysroot.mount. Nov 1 00:14:35.562540 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:14:35.574740 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:14:35.577474 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Nov 1 00:14:35.577572 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:14:35.577634 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:14:35.600396 systemd-networkd[1191]: eth0: Gained IPv6LL Nov 1 00:14:35.604925 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:14:35.628040 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:14:35.629549 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:14:35.657828 initrd-setup-root[1258]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:14:35.669365 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1253) Nov 1 00:14:35.669412 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:14:35.669437 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:14:35.669460 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:14:35.678098 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:14:35.681588 initrd-setup-root[1284]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:14:35.689183 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:14:35.697450 initrd-setup-root[1292]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:14:35.707305 initrd-setup-root[1300]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:14:35.890042 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:14:35.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.895135 systemd[1]: Starting ignition-mount.service... Nov 1 00:14:35.921775 kernel: audit: type=1130 audit(1761956075.892:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:35.907133 systemd[1]: Starting sysroot-boot.service... Nov 1 00:14:35.920190 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Nov 1 00:14:35.920358 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Nov 1 00:14:35.942279 ignition[1318]: INFO : Ignition 2.14.0 Nov 1 00:14:35.942279 ignition[1318]: INFO : Stage: mount Nov 1 00:14:35.951926 ignition[1318]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:35.951926 ignition[1318]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:35.971473 ignition[1318]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:35.971473 ignition[1318]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:35.971473 ignition[1318]: INFO : PUT result: OK Nov 1 00:14:35.982130 ignition[1318]: INFO : mount: mount passed Nov 1 00:14:35.984163 ignition[1318]: INFO : Ignition finished successfully Nov 1 00:14:35.989895 systemd[1]: Finished ignition-mount.service. Nov 1 00:14:35.995467 systemd[1]: Starting ignition-files.service... Nov 1 00:14:35.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:36.009139 kernel: audit: type=1130 audit(1761956075.993:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:36.013427 systemd[1]: Finished sysroot-boot.service. Nov 1 00:14:36.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:36.028033 kernel: audit: type=1130 audit(1761956076.016:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:36.030562 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:14:36.052110 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1330) Nov 1 00:14:36.058804 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:14:36.058851 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:14:36.061133 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:14:36.077092 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:14:36.082140 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:14:36.102310 ignition[1349]: INFO : Ignition 2.14.0 Nov 1 00:14:36.102310 ignition[1349]: INFO : Stage: files Nov 1 00:14:36.106356 ignition[1349]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:36.106356 ignition[1349]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:36.125644 ignition[1349]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:36.128770 ignition[1349]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:36.132391 ignition[1349]: INFO : PUT result: OK Nov 1 00:14:36.137454 ignition[1349]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:14:36.144155 ignition[1349]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:14:36.147632 ignition[1349]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:14:36.184256 ignition[1349]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:14:36.188410 ignition[1349]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:14:36.193190 unknown[1349]: wrote ssh authorized keys file for user: core Nov 1 00:14:36.195956 ignition[1349]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:14:36.200534 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Nov 1 00:14:36.205152 ignition[1349]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:36.230019 ignition[1349]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318135586" Nov 1 00:14:36.234000 ignition[1349]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318135586": device or resource busy Nov 1 00:14:36.234000 ignition[1349]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3318135586", trying btrfs: device or resource busy Nov 1 00:14:36.234000 ignition[1349]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318135586" Nov 1 00:14:36.234000 ignition[1349]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318135586" Nov 1 00:14:36.265573 ignition[1349]: INFO : op(3): [started] unmounting "/mnt/oem3318135586" Nov 1 00:14:36.268555 ignition[1349]: INFO : op(3): [finished] unmounting "/mnt/oem3318135586" Nov 1 00:14:36.268555 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Nov 1 00:14:36.275890 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Nov 1 00:14:36.280606 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 00:14:36.285053 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:14:36.289698 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:14:36.294311 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Nov 1 00:14:36.300815 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Nov 1 00:14:36.307282 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Nov 1 00:14:36.312270 ignition[1349]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:36.326142 ignition[1349]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274298557" Nov 1 00:14:36.329950 ignition[1349]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274298557": device or resource busy Nov 1 00:14:36.329950 ignition[1349]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2274298557", trying btrfs: device or resource busy Nov 1 00:14:36.329950 ignition[1349]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274298557" Nov 1 00:14:36.342449 ignition[1349]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274298557" Nov 1 00:14:36.346576 ignition[1349]: INFO : op(6): [started] unmounting "/mnt/oem2274298557" Nov 1 00:14:36.346576 ignition[1349]: INFO : op(6): [finished] unmounting "/mnt/oem2274298557" Nov 1 00:14:36.346576 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Nov 1 00:14:36.346576 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Nov 1 00:14:36.346576 ignition[1349]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:36.370295 ignition[1349]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2517704979" Nov 1 00:14:36.370295 ignition[1349]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2517704979": device or resource busy Nov 1 00:14:36.370295 ignition[1349]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2517704979", trying btrfs: device or resource busy Nov 1 00:14:36.370295 ignition[1349]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2517704979" Nov 1 00:14:36.386466 ignition[1349]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2517704979" Nov 1 00:14:36.386466 ignition[1349]: INFO : op(9): [started] unmounting "/mnt/oem2517704979" Nov 1 00:14:36.386466 ignition[1349]: INFO : op(9): [finished] unmounting "/mnt/oem2517704979" Nov 1 00:14:36.386466 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Nov 1 00:14:36.386466 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:14:36.405267 ignition[1349]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:14:36.420419 ignition[1349]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891362118" Nov 1 00:14:36.425090 ignition[1349]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891362118": device or resource busy Nov 1 00:14:36.425090 ignition[1349]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2891362118", trying btrfs: device or resource busy Nov 1 00:14:36.425090 ignition[1349]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891362118" Nov 1 00:14:36.425090 ignition[1349]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891362118" Nov 1 00:14:36.425090 ignition[1349]: INFO : op(c): [started] unmounting "/mnt/oem2891362118" Nov 1 00:14:36.425090 ignition[1349]: INFO : op(c): [finished] unmounting "/mnt/oem2891362118" Nov 1 00:14:36.425090 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:14:36.425090 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Nov 1 00:14:36.425090 ignition[1349]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.34.1-arm64.raw: attempt #1 Nov 1 00:14:36.773600 ignition[1349]: INFO : GET result: OK Nov 1 00:14:37.310123 ignition[1349]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-arm64.raw" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(b): [started] processing unit "amazon-ssm-agent.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(b): op(c): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(b): op(c): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(b): [finished] processing unit "amazon-ssm-agent.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(d): [started] processing unit "nvidia.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(d): [finished] processing unit "nvidia.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Nov 1 00:14:37.315391 ignition[1349]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Nov 1 00:14:37.374311 ignition[1349]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:14:37.378699 ignition[1349]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:14:37.378699 ignition[1349]: INFO : files: files passed Nov 1 00:14:37.378699 ignition[1349]: INFO : Ignition finished successfully Nov 1 00:14:37.390377 systemd[1]: Finished ignition-files.service. Nov 1 00:14:37.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.404153 kernel: audit: type=1130 audit(1761956077.391:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.404445 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:14:37.409700 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:14:37.411339 systemd[1]: Starting ignition-quench.service... Nov 1 00:14:37.422521 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:14:37.425287 systemd[1]: Finished ignition-quench.service. Nov 1 00:14:37.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.442087 kernel: audit: type=1130 audit(1761956077.431:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.447226 initrd-setup-root-after-ignition[1374]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:14:37.452664 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:14:37.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.457803 systemd[1]: Reached target ignition-complete.target. Nov 1 00:14:37.464344 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:14:37.493274 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:14:37.495955 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:14:37.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.500325 systemd[1]: Reached target initrd-fs.target. Nov 1 00:14:37.504276 systemd[1]: Reached target initrd.target. Nov 1 00:14:37.508113 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:14:37.512857 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:14:37.533834 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:14:37.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.537776 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:14:37.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.557494 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:14:37.560183 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:14:37.562825 systemd[1]: Stopped target timers.target. Nov 1 00:14:37.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.565017 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:14:37.565328 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:14:37.567949 systemd[1]: Stopped target initrd.target. Nov 1 00:14:37.570214 systemd[1]: Stopped target basic.target. Nov 1 00:14:37.572412 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:14:37.574974 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:14:37.577518 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:14:37.580054 systemd[1]: Stopped target remote-fs.target. Nov 1 00:14:37.655783 ignition[1387]: INFO : Ignition 2.14.0 Nov 1 00:14:37.655783 ignition[1387]: INFO : Stage: umount Nov 1 00:14:37.655783 ignition[1387]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:14:37.655783 ignition[1387]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:14:37.582476 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:14:37.675962 ignition[1387]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:14:37.675962 ignition[1387]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:14:37.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.586851 systemd[1]: Stopped target sysinit.target. Nov 1 00:14:37.589221 systemd[1]: Stopped target local-fs.target. Nov 1 00:14:37.593657 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:14:37.596158 systemd[1]: Stopped target swap.target. Nov 1 00:14:37.598238 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:14:37.598526 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:14:37.601076 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:14:37.603383 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:14:37.603651 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:14:37.607958 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:14:37.608273 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:14:37.611194 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:14:37.611456 systemd[1]: Stopped ignition-files.service. Nov 1 00:14:37.615363 systemd[1]: Stopping ignition-mount.service... Nov 1 00:14:37.626759 systemd[1]: Stopping iscsiuio.service... Nov 1 00:14:37.648300 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:14:37.655852 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:14:37.724266 ignition[1387]: INFO : PUT result: OK Nov 1 00:14:37.727298 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:14:37.734485 ignition[1387]: INFO : umount: umount passed Nov 1 00:14:37.736802 ignition[1387]: INFO : Ignition finished successfully Nov 1 00:14:37.740220 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:14:37.740555 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:14:37.743259 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:14:37.743462 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:14:37.748579 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:14:37.749270 systemd[1]: Stopped iscsiuio.service. Nov 1 00:14:37.765311 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:14:37.766002 systemd[1]: Stopped ignition-mount.service. Nov 1 00:14:37.774376 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:14:37.774680 systemd[1]: Stopped ignition-disks.service. Nov 1 00:14:37.780936 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:14:37.781146 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:14:37.787315 systemd[1]: ignition-fetch.service: Deactivated successfully. Nov 1 00:14:37.787498 systemd[1]: Stopped ignition-fetch.service. Nov 1 00:14:37.793761 systemd[1]: Stopped target network.target. Nov 1 00:14:37.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.798011 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:14:37.798298 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:14:37.805453 systemd[1]: Stopped target paths.target. Nov 1 00:14:37.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.809344 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:14:37.813512 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:14:37.818234 systemd[1]: Stopped target slices.target. Nov 1 00:14:37.822009 systemd[1]: Stopped target sockets.target. Nov 1 00:14:37.826047 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:14:37.826246 systemd[1]: Closed iscsid.socket. Nov 1 00:14:37.831794 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:14:37.831973 systemd[1]: Closed iscsiuio.socket. Nov 1 00:14:37.837697 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:14:37.837889 systemd[1]: Stopped ignition-setup.service. Nov 1 00:14:37.844598 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:14:37.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.849170 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:14:37.850209 systemd-networkd[1191]: eth0: DHCPv6 lease lost Nov 1 00:14:37.856702 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:14:37.857076 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:14:37.863854 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:14:37.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.864205 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:14:37.872977 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:14:37.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.873284 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:14:37.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.877000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:14:37.882000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:14:37.879007 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:14:37.879107 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:14:37.885322 systemd[1]: Stopping network-cleanup.service... Nov 1 00:14:37.900267 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:14:37.900410 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:14:37.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.911046 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:14:37.911177 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:14:37.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.917608 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:14:37.917711 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:14:37.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.924909 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:14:37.935788 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:14:37.935972 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:14:37.940416 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:14:37.940604 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:14:37.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.948664 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:14:37.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.948783 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:14:37.960168 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:14:37.962747 systemd[1]: Stopped network-cleanup.service. Nov 1 00:14:37.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.967191 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:14:37.969895 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:14:37.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.974165 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:14:37.974261 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:14:37.978950 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:14:37.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.979020 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:14:37.979167 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:14:38.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:38.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:38.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:37.979245 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:14:37.985342 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:14:37.985422 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:14:37.987570 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:14:37.987644 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:14:37.991110 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:14:38.005184 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:14:38.005292 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:14:38.013233 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:14:38.013415 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:14:38.015991 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:14:38.019521 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:14:38.044875 systemd[1]: Switching root. Nov 1 00:14:38.076149 iscsid[1197]: iscsid shutting down. Nov 1 00:14:38.080270 systemd-journald[310]: Received SIGTERM from PID 1 (n/a). Nov 1 00:14:38.080351 systemd-journald[310]: Journal stopped Nov 1 00:14:42.840926 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:14:42.841055 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:14:42.841119 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:14:42.841152 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:14:42.841184 kernel: SELinux: policy capability open_perms=1 Nov 1 00:14:42.841215 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:14:42.841247 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:14:42.841278 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:14:42.841309 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:14:42.841344 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:14:42.841376 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:14:42.841410 systemd[1]: Successfully loaded SELinux policy in 82.204ms. Nov 1 00:14:42.841471 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.165ms. Nov 1 00:14:42.841506 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:14:42.841537 systemd[1]: Detected virtualization amazon. Nov 1 00:14:42.841568 systemd[1]: Detected architecture arm64. Nov 1 00:14:42.841602 systemd[1]: Detected first boot. Nov 1 00:14:42.841634 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:14:42.841665 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:14:42.841698 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:14:42.841740 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:14:42.841776 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:14:42.841810 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:14:42.841841 kernel: kauditd_printk_skb: 55 callbacks suppressed Nov 1 00:14:42.841875 kernel: audit: type=1334 audit(1761956082.295:86): prog-id=12 op=LOAD Nov 1 00:14:42.841906 kernel: audit: type=1334 audit(1761956082.295:87): prog-id=3 op=UNLOAD Nov 1 00:14:42.841937 kernel: audit: type=1334 audit(1761956082.297:88): prog-id=13 op=LOAD Nov 1 00:14:42.841966 kernel: audit: type=1334 audit(1761956082.300:89): prog-id=14 op=LOAD Nov 1 00:14:42.841996 kernel: audit: type=1334 audit(1761956082.300:90): prog-id=4 op=UNLOAD Nov 1 00:14:42.842025 kernel: audit: type=1334 audit(1761956082.300:91): prog-id=5 op=UNLOAD Nov 1 00:14:42.842055 kernel: audit: type=1334 audit(1761956082.305:92): prog-id=15 op=LOAD Nov 1 00:14:42.846831 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:14:42.847534 kernel: audit: type=1334 audit(1761956082.305:93): prog-id=12 op=UNLOAD Nov 1 00:14:42.847855 kernel: audit: type=1334 audit(1761956082.308:94): prog-id=16 op=LOAD Nov 1 00:14:42.848292 systemd[1]: Stopped iscsid.service. Nov 1 00:14:42.848329 kernel: audit: type=1334 audit(1761956082.310:95): prog-id=17 op=LOAD Nov 1 00:14:42.848372 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:14:42.848405 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:14:42.848437 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:14:42.848471 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:14:42.848508 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:14:42.848539 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Nov 1 00:14:42.848570 systemd[1]: Created slice system-getty.slice. Nov 1 00:14:42.848601 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:14:42.848633 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:14:42.848666 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:14:42.848696 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:14:42.848726 systemd[1]: Created slice user.slice. Nov 1 00:14:42.848759 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:14:42.855758 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:14:42.855809 systemd[1]: Set up automount boot.automount. Nov 1 00:14:42.855843 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:14:42.855873 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:14:42.855904 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:14:42.855936 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:14:42.855965 systemd[1]: Reached target integritysetup.target. Nov 1 00:14:42.855997 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:14:42.856036 systemd[1]: Reached target remote-fs.target. Nov 1 00:14:42.856127 systemd[1]: Reached target slices.target. Nov 1 00:14:42.856159 systemd[1]: Reached target swap.target. Nov 1 00:14:42.856189 systemd[1]: Reached target torcx.target. Nov 1 00:14:42.856219 systemd[1]: Reached target veritysetup.target. Nov 1 00:14:42.856252 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:14:42.856284 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:14:42.856314 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:14:42.856344 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:14:42.856375 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:14:42.856412 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:14:42.856442 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:14:42.856472 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:14:42.856503 systemd[1]: Mounting media.mount... Nov 1 00:14:42.856532 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:14:42.856562 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:14:42.856592 systemd[1]: Mounting tmp.mount... Nov 1 00:14:42.856622 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:14:42.856654 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:42.856690 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:14:42.856723 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:14:42.856764 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:42.856795 systemd[1]: Starting modprobe@drm.service... Nov 1 00:14:42.856826 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:14:42.856857 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:14:42.856888 systemd[1]: Starting modprobe@loop.service... Nov 1 00:14:42.856921 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:14:42.856954 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:14:42.856991 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:14:42.857022 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:14:42.857053 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:14:42.857119 kernel: fuse: init (API version 7.34) Nov 1 00:14:42.857155 systemd[1]: Stopped systemd-journald.service. Nov 1 00:14:42.866806 systemd[1]: Starting systemd-journald.service... Nov 1 00:14:42.866845 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:14:42.866876 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:14:42.866906 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:14:42.866945 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:14:42.866976 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:14:42.867006 systemd[1]: Stopped verity-setup.service. Nov 1 00:14:42.867036 kernel: loop: module loaded Nov 1 00:14:42.867086 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:14:42.867120 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:14:42.867149 systemd[1]: Mounted media.mount. Nov 1 00:14:42.867179 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:14:42.867233 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:14:42.867272 systemd[1]: Mounted tmp.mount. Nov 1 00:14:42.867303 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:14:42.867333 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:14:42.867363 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:14:42.867395 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:42.867429 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:42.867461 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:14:42.867490 systemd[1]: Finished modprobe@drm.service. Nov 1 00:14:42.867523 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:14:42.867553 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:14:42.867583 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:14:42.867612 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:14:42.867642 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:14:42.867671 systemd[1]: Finished modprobe@loop.service. Nov 1 00:14:42.867706 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:14:42.867738 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:14:42.867767 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:14:42.867797 systemd[1]: Reached target network-pre.target. Nov 1 00:14:42.867827 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:14:42.867860 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:14:42.867891 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:14:42.867923 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:14:42.867954 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:14:42.867984 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:14:42.868014 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:14:42.868104 systemd-journald[1508]: Journal started Nov 1 00:14:42.883408 systemd-journald[1508]: Runtime Journal (/run/log/journal/ec26953699095f2ccc5ca5850104b3ad) is 8.0M, max 75.4M, 67.4M free. Nov 1 00:14:42.889452 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:14:42.890051 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:14:42.898165 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:14:38.531000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:14:38.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:14:42.907870 systemd[1]: Started systemd-journald.service. Nov 1 00:14:38.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:14:38.650000 audit: BPF prog-id=10 op=LOAD Nov 1 00:14:38.650000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:14:38.650000 audit: BPF prog-id=11 op=LOAD Nov 1 00:14:38.650000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:14:38.789000 audit[1421]: AVC avc: denied { associate } for pid=1421 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:14:38.789000 audit[1421]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014d89c a1=40000d0de0 a2=40000d70c0 a3=32 items=0 ppid=1404 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:38.789000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:14:38.793000 audit[1421]: AVC avc: denied { associate } for pid=1421 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:14:38.793000 audit[1421]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400014d979 a2=1ed a3=0 items=2 ppid=1404 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:38.793000 audit: CWD cwd="/" Nov 1 00:14:38.793000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:14:38.793000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:14:38.793000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:14:42.295000 audit: BPF prog-id=12 op=LOAD Nov 1 00:14:42.295000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:14:42.297000 audit: BPF prog-id=13 op=LOAD Nov 1 00:14:42.300000 audit: BPF prog-id=14 op=LOAD Nov 1 00:14:42.300000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:14:42.300000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:14:42.305000 audit: BPF prog-id=15 op=LOAD Nov 1 00:14:42.305000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:14:42.308000 audit: BPF prog-id=16 op=LOAD Nov 1 00:14:42.310000 audit: BPF prog-id=17 op=LOAD Nov 1 00:14:42.310000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:14:42.310000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:14:42.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.324000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:14:42.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.643000 audit: BPF prog-id=18 op=LOAD Nov 1 00:14:42.643000 audit: BPF prog-id=19 op=LOAD Nov 1 00:14:42.643000 audit: BPF prog-id=20 op=LOAD Nov 1 00:14:42.643000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:14:42.643000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:14:42.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.809000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:14:42.809000 audit[1508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffc0122630 a2=4000 a3=1 items=0 ppid=1 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:42.809000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:14:42.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.293535 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:14:38.785768 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:14:42.293555 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Nov 1 00:14:38.786655 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:14:42.313696 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:14:38.786706 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:14:42.905216 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:14:38.786773 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:14:38.786799 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:14:38.786861 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:14:38.786892 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:14:38.787351 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:14:38.787437 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:14:38.787474 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:14:38.788891 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:14:42.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:38.788972 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:14:42.919839 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:14:38.789036 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:14:42.922636 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:14:38.789099 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:14:42.926022 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:14:38.789148 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:14:42.930753 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:14:38.789187 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:14:41.529926 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:41.530479 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:41.530716 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:41.531178 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:14:41.531291 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:14:41.531431 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2025-11-01T00:14:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:14:42.950919 systemd-journald[1508]: Time spent on flushing to /var/log/journal/ec26953699095f2ccc5ca5850104b3ad is 45.618ms for 1121 entries. Nov 1 00:14:42.950919 systemd-journald[1508]: System Journal (/var/log/journal/ec26953699095f2ccc5ca5850104b3ad) is 8.0M, max 195.6M, 187.6M free. Nov 1 00:14:43.020253 systemd-journald[1508]: Received client request to flush runtime journal. Nov 1 00:14:42.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:42.975913 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:14:43.002675 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:14:43.021848 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:14:43.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.049202 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:14:43.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.053682 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:14:43.068628 udevadm[1540]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Nov 1 00:14:43.807687 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:14:43.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.810000 audit: BPF prog-id=21 op=LOAD Nov 1 00:14:43.810000 audit: BPF prog-id=22 op=LOAD Nov 1 00:14:43.810000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:14:43.810000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:14:43.812645 systemd[1]: Starting systemd-udevd.service... Nov 1 00:14:43.851854 systemd-udevd[1541]: Using default interface naming scheme 'v252'. Nov 1 00:14:43.893765 systemd[1]: Started systemd-udevd.service. Nov 1 00:14:43.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:43.898000 audit: BPF prog-id=23 op=LOAD Nov 1 00:14:43.900655 systemd[1]: Starting systemd-networkd.service... Nov 1 00:14:43.916000 audit: BPF prog-id=24 op=LOAD Nov 1 00:14:43.916000 audit: BPF prog-id=25 op=LOAD Nov 1 00:14:43.916000 audit: BPF prog-id=26 op=LOAD Nov 1 00:14:43.919037 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:14:43.997277 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Nov 1 00:14:44.013639 systemd[1]: Started systemd-userdbd.service. Nov 1 00:14:44.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.034733 (udev-worker)[1558]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:14:44.201358 systemd-networkd[1548]: lo: Link UP Nov 1 00:14:44.201385 systemd-networkd[1548]: lo: Gained carrier Nov 1 00:14:44.202338 systemd-networkd[1548]: Enumeration completed Nov 1 00:14:44.202504 systemd[1]: Started systemd-networkd.service. Nov 1 00:14:44.203305 systemd-networkd[1548]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:14:44.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.208822 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:14:44.220121 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:14:44.217876 systemd-networkd[1548]: eth0: Link UP Nov 1 00:14:44.218187 systemd-networkd[1548]: eth0: Gained carrier Nov 1 00:14:44.237360 systemd-networkd[1548]: eth0: DHCPv4 address 172.31.29.96/20, gateway 172.31.16.1 acquired from 172.31.16.1 Nov 1 00:14:44.363318 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:14:44.366575 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:14:44.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.370984 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:14:44.399822 lvm[1660]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:14:44.437657 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:14:44.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.440288 systemd[1]: Reached target cryptsetup.target. Nov 1 00:14:44.444577 systemd[1]: Starting lvm2-activation.service... Nov 1 00:14:44.452575 lvm[1661]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:14:44.484699 systemd[1]: Finished lvm2-activation.service. Nov 1 00:14:44.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.487323 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:14:44.489578 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:14:44.489633 systemd[1]: Reached target local-fs.target. Nov 1 00:14:44.491789 systemd[1]: Reached target machines.target. Nov 1 00:14:44.496296 systemd[1]: Starting ldconfig.service... Nov 1 00:14:44.499532 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:44.499685 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:44.502289 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:14:44.507932 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:14:44.518659 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:14:44.528655 systemd[1]: Starting systemd-sysext.service... Nov 1 00:14:44.537114 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1663 (bootctl) Nov 1 00:14:44.540755 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:14:44.569718 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 00:14:44.576133 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:14:44.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.590928 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 00:14:44.591449 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 00:14:44.616103 kernel: loop0: detected capacity change from 0 to 200800 Nov 1 00:14:44.669449 systemd-fsck[1672]: fsck.fat 4.2 (2021-01-31) Nov 1 00:14:44.669449 systemd-fsck[1672]: /dev/nvme0n1p1: 236 files, 117310/258078 clusters Nov 1 00:14:44.672623 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:14:44.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.678211 systemd[1]: Mounting boot.mount... Nov 1 00:14:44.698943 systemd[1]: Mounted boot.mount. Nov 1 00:14:44.726152 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 00:14:44.739560 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:14:44.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.755125 kernel: loop1: detected capacity change from 0 to 200800 Nov 1 00:14:44.778520 (sd-sysext)[1688]: Using extensions 'kubernetes'. Nov 1 00:14:44.782153 (sd-sysext)[1688]: Merged extensions into '/usr'. Nov 1 00:14:44.827034 systemd[1]: Mounting usr-share-oem.mount... Nov 1 00:14:44.835578 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:44.838242 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:44.842815 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:14:44.851053 systemd[1]: Starting modprobe@loop.service... Nov 1 00:14:44.855440 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:44.855787 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:44.860156 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:14:44.863019 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:14:44.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.866621 systemd[1]: Mounted usr-share-oem.mount. Nov 1 00:14:44.869816 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:44.870206 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:44.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.873600 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:14:44.873910 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:14:44.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.877694 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:14:44.877991 systemd[1]: Finished modprobe@loop.service. Nov 1 00:14:44.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.881350 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:14:44.881536 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:14:44.883493 systemd[1]: Finished systemd-sysext.service. Nov 1 00:14:44.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:44.888696 systemd[1]: Starting ensure-sysext.service... Nov 1 00:14:44.894940 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:14:44.908513 systemd[1]: Reloading. Nov 1 00:14:44.942545 systemd-tmpfiles[1695]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:14:44.956515 systemd-tmpfiles[1695]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:14:44.967694 systemd-tmpfiles[1695]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:14:45.029841 /usr/lib/systemd/system-generators/torcx-generator[1714]: time="2025-11-01T00:14:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:14:45.032961 /usr/lib/systemd/system-generators/torcx-generator[1714]: time="2025-11-01T00:14:45Z" level=info msg="torcx already run" Nov 1 00:14:45.309246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:14:45.309904 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:14:45.319683 ldconfig[1662]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:14:45.353987 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:14:45.494000 audit: BPF prog-id=27 op=LOAD Nov 1 00:14:45.494000 audit: BPF prog-id=24 op=UNLOAD Nov 1 00:14:45.494000 audit: BPF prog-id=28 op=LOAD Nov 1 00:14:45.494000 audit: BPF prog-id=29 op=LOAD Nov 1 00:14:45.495000 audit: BPF prog-id=25 op=UNLOAD Nov 1 00:14:45.495000 audit: BPF prog-id=26 op=UNLOAD Nov 1 00:14:45.495000 audit: BPF prog-id=30 op=LOAD Nov 1 00:14:45.495000 audit: BPF prog-id=31 op=LOAD Nov 1 00:14:45.495000 audit: BPF prog-id=21 op=UNLOAD Nov 1 00:14:45.495000 audit: BPF prog-id=22 op=UNLOAD Nov 1 00:14:45.498000 audit: BPF prog-id=32 op=LOAD Nov 1 00:14:45.498000 audit: BPF prog-id=18 op=UNLOAD Nov 1 00:14:45.499000 audit: BPF prog-id=33 op=LOAD Nov 1 00:14:45.499000 audit: BPF prog-id=34 op=LOAD Nov 1 00:14:45.499000 audit: BPF prog-id=19 op=UNLOAD Nov 1 00:14:45.499000 audit: BPF prog-id=20 op=UNLOAD Nov 1 00:14:45.504000 audit: BPF prog-id=35 op=LOAD Nov 1 00:14:45.504000 audit: BPF prog-id=23 op=UNLOAD Nov 1 00:14:45.526722 systemd[1]: Finished ldconfig.service. Nov 1 00:14:45.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.530960 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:14:45.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.545944 systemd[1]: Starting audit-rules.service... Nov 1 00:14:45.554943 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:14:45.563473 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:14:45.566000 audit: BPF prog-id=36 op=LOAD Nov 1 00:14:45.569719 systemd[1]: Starting systemd-resolved.service... Nov 1 00:14:45.572000 audit: BPF prog-id=37 op=LOAD Nov 1 00:14:45.575491 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:14:45.582882 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:14:45.591022 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.595643 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:45.600417 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:14:45.610643 systemd[1]: Starting modprobe@loop.service... Nov 1 00:14:45.612931 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.613346 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:45.615663 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:14:45.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.621769 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.622096 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.622338 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:45.622569 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:14:45.623863 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:45.627266 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:45.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.630235 systemd-networkd[1548]: eth0: Gained IPv6LL Nov 1 00:14:45.636317 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.640718 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:14:45.645530 systemd[1]: Starting modprobe@drm.service... Nov 1 00:14:45.652533 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.652905 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:45.653255 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:14:45.655455 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:14:45.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.661000 audit[1779]: SYSTEM_BOOT pid=1779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.662915 systemd[1]: Finished ensure-sysext.service. Nov 1 00:14:45.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.674755 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:14:45.675095 systemd[1]: Finished modprobe@loop.service. Nov 1 00:14:45.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.679410 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:14:45.679736 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:14:45.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.689029 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:14:45.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.691842 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:14:45.693997 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:14:45.694408 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:14:45.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.697280 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.702182 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:14:45.702484 systemd[1]: Finished modprobe@drm.service. Nov 1 00:14:45.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.724002 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:14:45.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.734620 systemd[1]: Starting systemd-update-done.service... Nov 1 00:14:45.762588 systemd[1]: Finished systemd-update-done.service. Nov 1 00:14:45.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:45.793000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:14:45.793000 audit[1797]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff776e370 a2=420 a3=0 items=0 ppid=1771 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:45.793000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:14:45.795133 augenrules[1797]: No rules Nov 1 00:14:45.796778 systemd[1]: Finished audit-rules.service. Nov 1 00:14:45.822406 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:14:45.825513 systemd[1]: Reached target time-set.target. Nov 1 00:14:45.830784 systemd-resolved[1777]: Positive Trust Anchors: Nov 1 00:14:45.830810 systemd-resolved[1777]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:14:45.830863 systemd-resolved[1777]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:14:45.860553 systemd-timesyncd[1778]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Nov 1 00:14:45.861193 systemd-timesyncd[1778]: Initial clock synchronization to Sat 2025-11-01 00:14:45.931762 UTC. Nov 1 00:14:45.861728 systemd-resolved[1777]: Defaulting to hostname 'linux'. Nov 1 00:14:45.864749 systemd[1]: Started systemd-resolved.service. Nov 1 00:14:45.867236 systemd[1]: Reached target network.target. Nov 1 00:14:45.869377 systemd[1]: Reached target network-online.target. Nov 1 00:14:45.871747 systemd[1]: Reached target nss-lookup.target. Nov 1 00:14:45.873972 systemd[1]: Reached target sysinit.target. Nov 1 00:14:45.876264 systemd[1]: Started motdgen.path. Nov 1 00:14:45.878227 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 00:14:45.881386 systemd[1]: Started logrotate.timer. Nov 1 00:14:45.883525 systemd[1]: Started mdadm.timer. Nov 1 00:14:45.885381 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 00:14:45.887680 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 00:14:45.887739 systemd[1]: Reached target paths.target. Nov 1 00:14:45.889836 systemd[1]: Reached target timers.target. Nov 1 00:14:45.892456 systemd[1]: Listening on dbus.socket. Nov 1 00:14:45.896622 systemd[1]: Starting docker.socket... Nov 1 00:14:45.903460 systemd[1]: Listening on sshd.socket. Nov 1 00:14:45.905601 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:45.906479 systemd[1]: Listening on docker.socket. Nov 1 00:14:45.908678 systemd[1]: Reached target sockets.target. Nov 1 00:14:45.910893 systemd[1]: Reached target basic.target. Nov 1 00:14:45.913014 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.913106 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:14:45.915255 systemd[1]: Started amazon-ssm-agent.service. Nov 1 00:14:45.919914 systemd[1]: Starting containerd.service... Nov 1 00:14:45.924939 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Nov 1 00:14:45.930146 systemd[1]: Starting dbus.service... Nov 1 00:14:45.937314 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 00:14:45.946762 systemd[1]: Starting extend-filesystems.service... Nov 1 00:14:45.950990 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 00:14:45.968157 jq[1809]: false Nov 1 00:14:45.960328 systemd[1]: Starting kubelet.service... Nov 1 00:14:45.974297 systemd[1]: Starting motdgen.service... Nov 1 00:14:45.984554 systemd[1]: Started nvidia.service. Nov 1 00:14:45.997225 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 00:14:46.003927 systemd[1]: Starting sshd-keygen.service... Nov 1 00:14:46.017423 systemd[1]: Starting systemd-logind.service... Nov 1 00:14:46.021290 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:14:46.021431 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Nov 1 00:14:46.022387 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 00:14:46.023953 systemd[1]: Starting update-engine.service... Nov 1 00:14:46.033315 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 00:14:46.077360 jq[1824]: true Nov 1 00:14:46.045087 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 00:14:46.045532 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 00:14:46.115297 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 00:14:46.115674 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 00:14:46.145532 jq[1835]: true Nov 1 00:14:46.155968 dbus-daemon[1808]: [system] SELinux support is enabled Nov 1 00:14:46.157439 systemd[1]: Started dbus.service. Nov 1 00:14:46.182338 extend-filesystems[1810]: Found loop1 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1p1 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1p2 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1p3 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found usr Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1p4 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1p6 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1p7 Nov 1 00:14:46.182338 extend-filesystems[1810]: Found nvme0n1p9 Nov 1 00:14:46.182338 extend-filesystems[1810]: Checking size of /dev/nvme0n1p9 Nov 1 00:14:46.167007 dbus-daemon[1808]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1548 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Nov 1 00:14:46.166512 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 00:14:46.223327 dbus-daemon[1808]: [system] Successfully activated service 'org.freedesktop.systemd1' Nov 1 00:14:46.166602 systemd[1]: Reached target system-config.target. Nov 1 00:14:46.175362 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 00:14:46.175409 systemd[1]: Reached target user-config.target. Nov 1 00:14:46.223224 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 00:14:46.223570 systemd[1]: Finished motdgen.service. Nov 1 00:14:46.238017 systemd[1]: Starting systemd-hostnamed.service... Nov 1 00:14:46.335830 extend-filesystems[1810]: Resized partition /dev/nvme0n1p9 Nov 1 00:14:46.340650 extend-filesystems[1858]: resize2fs 1.46.5 (30-Dec-2021) Nov 1 00:14:46.359671 update_engine[1823]: I1101 00:14:46.339423 1823 main.cc:92] Flatcar Update Engine starting Nov 1 00:14:46.359671 update_engine[1823]: I1101 00:14:46.349640 1823 update_check_scheduler.cc:74] Next update check in 5m17s Nov 1 00:14:46.347918 systemd[1]: Started update-engine.service. Nov 1 00:14:46.355136 systemd[1]: Started locksmithd.service. Nov 1 00:14:46.382112 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 3587067 blocks Nov 1 00:14:46.477024 systemd[1]: nvidia.service: Deactivated successfully. Nov 1 00:14:46.505190 bash[1869]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:14:46.506471 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 00:14:46.523091 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 3587067 Nov 1 00:14:46.559406 extend-filesystems[1858]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Nov 1 00:14:46.559406 extend-filesystems[1858]: old_desc_blocks = 1, new_desc_blocks = 2 Nov 1 00:14:46.559406 extend-filesystems[1858]: The filesystem on /dev/nvme0n1p9 is now 3587067 (4k) blocks long. Nov 1 00:14:46.587168 extend-filesystems[1810]: Resized filesystem in /dev/nvme0n1p9 Nov 1 00:14:46.570875 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 00:14:46.571252 systemd[1]: Finished extend-filesystems.service. Nov 1 00:14:46.610722 env[1828]: time="2025-11-01T00:14:46.610624356Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 00:14:46.646011 amazon-ssm-agent[1805]: 2025/11/01 00:14:46 Failed to load instance info from vault. RegistrationKey does not exist. Nov 1 00:14:46.672128 amazon-ssm-agent[1805]: Initializing new seelog logger Nov 1 00:14:46.680490 amazon-ssm-agent[1805]: New Seelog Logger Creation Complete Nov 1 00:14:46.680974 amazon-ssm-agent[1805]: 2025/11/01 00:14:46 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Nov 1 00:14:46.681176 amazon-ssm-agent[1805]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Nov 1 00:14:46.681712 amazon-ssm-agent[1805]: 2025/11/01 00:14:46 processing appconfig overrides Nov 1 00:14:46.693967 systemd-logind[1821]: Watching system buttons on /dev/input/event0 (Power Button) Nov 1 00:14:46.698307 systemd-logind[1821]: Watching system buttons on /dev/input/event1 (Sleep Button) Nov 1 00:14:46.701284 systemd-logind[1821]: New seat seat0. Nov 1 00:14:46.712141 systemd[1]: Started systemd-logind.service. Nov 1 00:14:46.780287 env[1828]: time="2025-11-01T00:14:46.780197762Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 00:14:46.780538 env[1828]: time="2025-11-01T00:14:46.780489906Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:46.786001 env[1828]: time="2025-11-01T00:14:46.785725092Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:14:46.786001 env[1828]: time="2025-11-01T00:14:46.785986157Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:46.787983 env[1828]: time="2025-11-01T00:14:46.787890661Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:14:46.787983 env[1828]: time="2025-11-01T00:14:46.787964429Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:46.788218 env[1828]: time="2025-11-01T00:14:46.788008148Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 00:14:46.788218 env[1828]: time="2025-11-01T00:14:46.788033839Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:46.788338 env[1828]: time="2025-11-01T00:14:46.788245035Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:46.788749 env[1828]: time="2025-11-01T00:14:46.788691859Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:14:46.789039 env[1828]: time="2025-11-01T00:14:46.788983700Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:14:46.789145 env[1828]: time="2025-11-01T00:14:46.789034126Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 00:14:46.796802 env[1828]: time="2025-11-01T00:14:46.796717968Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 00:14:46.796802 env[1828]: time="2025-11-01T00:14:46.796787245Z" level=info msg="metadata content store policy set" policy=shared Nov 1 00:14:46.808771 env[1828]: time="2025-11-01T00:14:46.808688298Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 00:14:46.808919 env[1828]: time="2025-11-01T00:14:46.808775069Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 00:14:46.808919 env[1828]: time="2025-11-01T00:14:46.808808679Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 00:14:46.808919 env[1828]: time="2025-11-01T00:14:46.808879033Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809148 env[1828]: time="2025-11-01T00:14:46.808915306Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809148 env[1828]: time="2025-11-01T00:14:46.808947753Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809148 env[1828]: time="2025-11-01T00:14:46.808980454Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809617 env[1828]: time="2025-11-01T00:14:46.809554729Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809703 env[1828]: time="2025-11-01T00:14:46.809620446Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809703 env[1828]: time="2025-11-01T00:14:46.809654794Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809703 env[1828]: time="2025-11-01T00:14:46.809691055Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.809877 env[1828]: time="2025-11-01T00:14:46.809722436Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 00:14:46.810007 env[1828]: time="2025-11-01T00:14:46.809958439Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 00:14:46.810220 env[1828]: time="2025-11-01T00:14:46.810174551Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 00:14:46.810638 env[1828]: time="2025-11-01T00:14:46.810578382Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 00:14:46.810741 env[1828]: time="2025-11-01T00:14:46.810651364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.810741 env[1828]: time="2025-11-01T00:14:46.810695252Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 00:14:46.810956 env[1828]: time="2025-11-01T00:14:46.810913058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811025 env[1828]: time="2025-11-01T00:14:46.810958956Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811025 env[1828]: time="2025-11-01T00:14:46.810991766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811164 env[1828]: time="2025-11-01T00:14:46.811020945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811164 env[1828]: time="2025-11-01T00:14:46.811051224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811348 env[1828]: time="2025-11-01T00:14:46.811218447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811424 env[1828]: time="2025-11-01T00:14:46.811355366Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811424 env[1828]: time="2025-11-01T00:14:46.811388733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811543 env[1828]: time="2025-11-01T00:14:46.811423263Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 00:14:46.811751 env[1828]: time="2025-11-01T00:14:46.811703191Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811833 env[1828]: time="2025-11-01T00:14:46.811752503Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811833 env[1828]: time="2025-11-01T00:14:46.811785385Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.811833 env[1828]: time="2025-11-01T00:14:46.811814939Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 00:14:46.811981 env[1828]: time="2025-11-01T00:14:46.811847168Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 00:14:46.811981 env[1828]: time="2025-11-01T00:14:46.811878513Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 00:14:46.811981 env[1828]: time="2025-11-01T00:14:46.811913817Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 00:14:46.812184 env[1828]: time="2025-11-01T00:14:46.811977186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 00:14:46.812440 env[1828]: time="2025-11-01T00:14:46.812328412Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 00:14:46.814343 env[1828]: time="2025-11-01T00:14:46.812444386Z" level=info msg="Connect containerd service" Nov 1 00:14:46.814343 env[1828]: time="2025-11-01T00:14:46.812509510Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 00:14:46.827701 env[1828]: time="2025-11-01T00:14:46.827622583Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:14:46.828353 env[1828]: time="2025-11-01T00:14:46.828289199Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 00:14:46.828460 env[1828]: time="2025-11-01T00:14:46.828418974Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 00:14:46.830503 env[1828]: time="2025-11-01T00:14:46.828519342Z" level=info msg="containerd successfully booted in 0.223197s" Nov 1 00:14:46.828643 systemd[1]: Started containerd.service. Nov 1 00:14:46.840261 env[1828]: time="2025-11-01T00:14:46.840102015Z" level=info msg="Start subscribing containerd event" Nov 1 00:14:46.840261 env[1828]: time="2025-11-01T00:14:46.840221209Z" level=info msg="Start recovering state" Nov 1 00:14:46.840441 env[1828]: time="2025-11-01T00:14:46.840409910Z" level=info msg="Start event monitor" Nov 1 00:14:46.840541 env[1828]: time="2025-11-01T00:14:46.840443895Z" level=info msg="Start snapshots syncer" Nov 1 00:14:46.840541 env[1828]: time="2025-11-01T00:14:46.840469356Z" level=info msg="Start cni network conf syncer for default" Nov 1 00:14:46.840541 env[1828]: time="2025-11-01T00:14:46.840498679Z" level=info msg="Start streaming server" Nov 1 00:14:46.935197 dbus-daemon[1808]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 1 00:14:46.935587 systemd[1]: Started systemd-hostnamed.service. Nov 1 00:14:46.941738 dbus-daemon[1808]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1850 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Nov 1 00:14:46.946830 systemd[1]: Starting polkit.service... Nov 1 00:14:47.005213 polkitd[1931]: Started polkitd version 121 Nov 1 00:14:47.056545 polkitd[1931]: Loading rules from directory /etc/polkit-1/rules.d Nov 1 00:14:47.056676 polkitd[1931]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 1 00:14:47.062841 polkitd[1931]: Finished loading, compiling and executing 2 rules Nov 1 00:14:47.064035 dbus-daemon[1808]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Nov 1 00:14:47.064350 systemd[1]: Started polkit.service. Nov 1 00:14:47.070452 polkitd[1931]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Nov 1 00:14:47.141248 systemd-hostnamed[1850]: Hostname set to (transient) Nov 1 00:14:47.141404 systemd-resolved[1777]: System hostname changed to 'ip-172-31-29-96'. Nov 1 00:14:47.229385 coreos-metadata[1807]: Nov 01 00:14:47.226 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Nov 1 00:14:47.240445 coreos-metadata[1807]: Nov 01 00:14:47.240 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Nov 1 00:14:47.241381 coreos-metadata[1807]: Nov 01 00:14:47.241 INFO Fetch successful Nov 1 00:14:47.241381 coreos-metadata[1807]: Nov 01 00:14:47.241 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Nov 1 00:14:47.243490 coreos-metadata[1807]: Nov 01 00:14:47.243 INFO Fetch successful Nov 1 00:14:47.247616 unknown[1807]: wrote ssh authorized keys file for user: core Nov 1 00:14:47.260979 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Create new startup processor Nov 1 00:14:47.263364 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [LongRunningPluginsManager] registered plugins: {} Nov 1 00:14:47.263573 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing bookkeeping folders Nov 1 00:14:47.263691 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO removing the completed state files Nov 1 00:14:47.263805 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing bookkeeping folders for long running plugins Nov 1 00:14:47.263918 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Nov 1 00:14:47.264033 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing healthcheck folders for long running plugins Nov 1 00:14:47.277237 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing locations for inventory plugin Nov 1 00:14:47.277454 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing default location for custom inventory Nov 1 00:14:47.277577 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing default location for file inventory Nov 1 00:14:47.277696 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Initializing default location for role inventory Nov 1 00:14:47.277822 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Init the cloudwatchlogs publisher Nov 1 00:14:47.277941 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:softwareInventory Nov 1 00:14:47.278089 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:configurePackage Nov 1 00:14:47.278223 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:downloadContent Nov 1 00:14:47.278359 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:runPowerShellScript Nov 1 00:14:47.279961 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:updateSsmAgent Nov 1 00:14:47.280173 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:configureDocker Nov 1 00:14:47.280366 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:runDockerAction Nov 1 00:14:47.280512 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:refreshAssociation Nov 1 00:14:47.280680 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform independent plugin aws:runDocument Nov 1 00:14:47.280799 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Successfully loaded platform dependent plugin aws:runShellScript Nov 1 00:14:47.280916 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Nov 1 00:14:47.281032 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO OS: linux, Arch: arm64 Nov 1 00:14:47.284800 amazon-ssm-agent[1805]: datastore file /var/lib/amazon/ssm/i-048c85d2bd380b5ec/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Nov 1 00:14:47.286929 update-ssh-keys[1978]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:14:47.288305 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Nov 1 00:14:47.362136 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] Starting session document processing engine... Nov 1 00:14:47.457200 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] [EngineProcessor] Starting Nov 1 00:14:47.551460 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Nov 1 00:14:47.600417 locksmithd[1859]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 00:14:47.646007 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-048c85d2bd380b5ec, requestId: 14924dab-62ec-40dc-9770-a58521cb2dc2 Nov 1 00:14:47.740825 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] Starting document processing engine... Nov 1 00:14:47.835670 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] [EngineProcessor] Starting Nov 1 00:14:47.930796 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Nov 1 00:14:48.026214 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] listening reply. Nov 1 00:14:48.121621 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [HealthCheck] HealthCheck reporting agent health. Nov 1 00:14:48.217373 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [OfflineService] Starting document processing engine... Nov 1 00:14:48.313305 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [OfflineService] [EngineProcessor] Starting Nov 1 00:14:48.409385 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [OfflineService] [EngineProcessor] Initial processing Nov 1 00:14:48.505665 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [OfflineService] Starting message polling Nov 1 00:14:48.551938 systemd[1]: Started kubelet.service. Nov 1 00:14:48.602290 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [OfflineService] Starting send replies to MDS Nov 1 00:14:48.698912 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [LongRunningPluginsManager] starting long running plugin manager Nov 1 00:14:48.795798 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] Starting message polling Nov 1 00:14:48.892922 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] Starting send replies to MDS Nov 1 00:14:48.990180 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [instanceID=i-048c85d2bd380b5ec] Starting association polling Nov 1 00:14:49.087653 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Nov 1 00:14:49.185388 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] [Association] Launching response handler Nov 1 00:14:49.283223 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Nov 1 00:14:49.338555 kubelet[2001]: E1101 00:14:49.338483 2001 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:14:49.342210 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:14:49.342526 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:14:49.342957 systemd[1]: kubelet.service: Consumed 1.435s CPU time. Nov 1 00:14:49.381229 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Nov 1 00:14:49.479640 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Nov 1 00:14:49.578126 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [StartupProcessor] Executing startup processor tasks Nov 1 00:14:49.676687 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Nov 1 00:14:49.775631 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Nov 1 00:14:49.874565 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Nov 1 00:14:49.973810 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Nov 1 00:14:50.073235 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Nov 1 00:14:50.172778 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-048c85d2bd380b5ec?role=subscribe&stream=input Nov 1 00:14:50.272562 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-048c85d2bd380b5ec?role=subscribe&stream=input Nov 1 00:14:50.319857 sshd_keygen[1836]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 00:14:50.355512 systemd[1]: Finished sshd-keygen.service. Nov 1 00:14:50.360663 systemd[1]: Starting issuegen.service... Nov 1 00:14:50.371108 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 00:14:50.371477 systemd[1]: Finished issuegen.service. Nov 1 00:14:50.373570 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] Starting receiving message from control channel Nov 1 00:14:50.376488 systemd[1]: Starting systemd-user-sessions.service... Nov 1 00:14:50.390003 systemd[1]: Finished systemd-user-sessions.service. Nov 1 00:14:50.394993 systemd[1]: Started getty@tty1.service. Nov 1 00:14:50.400386 systemd[1]: Started serial-getty@ttyS0.service. Nov 1 00:14:50.402879 systemd[1]: Reached target getty.target. Nov 1 00:14:50.405148 systemd[1]: Reached target multi-user.target. Nov 1 00:14:50.412048 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 00:14:50.430859 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 00:14:50.431288 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 00:14:50.436423 systemd[1]: Startup finished in 1.195s (kernel) + 7.829s (initrd) + 12.005s (userspace) = 21.030s. Nov 1 00:14:50.473779 amazon-ssm-agent[1805]: 2025-11-01 00:14:47 INFO [MessageGatewayService] [EngineProcessor] Initial processing Nov 1 00:14:55.284038 systemd[1]: Created slice system-sshd.slice. Nov 1 00:14:55.286504 systemd[1]: Started sshd@0-172.31.29.96:22-147.75.109.163:40860.service. Nov 1 00:14:55.482445 sshd[2021]: Accepted publickey for core from 147.75.109.163 port 40860 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:55.487809 sshd[2021]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:55.510832 systemd[1]: Created slice user-500.slice. Nov 1 00:14:55.513545 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 00:14:55.518363 systemd-logind[1821]: New session 1 of user core. Nov 1 00:14:55.543136 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 00:14:55.547521 systemd[1]: Starting user@500.service... Nov 1 00:14:55.555863 (systemd)[2024]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:55.733551 systemd[2024]: Queued start job for default target default.target. Nov 1 00:14:55.735051 systemd[2024]: Reached target paths.target. Nov 1 00:14:55.735315 systemd[2024]: Reached target sockets.target. Nov 1 00:14:55.735771 systemd[2024]: Reached target timers.target. Nov 1 00:14:55.735943 systemd[2024]: Reached target basic.target. Nov 1 00:14:55.736210 systemd[2024]: Reached target default.target. Nov 1 00:14:55.736299 systemd[1]: Started user@500.service. Nov 1 00:14:55.736645 systemd[2024]: Startup finished in 168ms. Nov 1 00:14:55.740229 systemd[1]: Started session-1.scope. Nov 1 00:14:55.886999 systemd[1]: Started sshd@1-172.31.29.96:22-147.75.109.163:40874.service. Nov 1 00:14:56.061670 sshd[2033]: Accepted publickey for core from 147.75.109.163 port 40874 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:56.064257 sshd[2033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:56.073198 systemd-logind[1821]: New session 2 of user core. Nov 1 00:14:56.073454 systemd[1]: Started session-2.scope. Nov 1 00:14:56.203043 sshd[2033]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:56.208592 systemd-logind[1821]: Session 2 logged out. Waiting for processes to exit. Nov 1 00:14:56.209215 systemd[1]: session-2.scope: Deactivated successfully. Nov 1 00:14:56.210442 systemd[1]: sshd@1-172.31.29.96:22-147.75.109.163:40874.service: Deactivated successfully. Nov 1 00:14:56.211978 systemd-logind[1821]: Removed session 2. Nov 1 00:14:56.233553 systemd[1]: Started sshd@2-172.31.29.96:22-147.75.109.163:40880.service. Nov 1 00:14:56.405047 sshd[2039]: Accepted publickey for core from 147.75.109.163 port 40880 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:56.408108 sshd[2039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:56.415161 systemd-logind[1821]: New session 3 of user core. Nov 1 00:14:56.416631 systemd[1]: Started session-3.scope. Nov 1 00:14:56.538274 sshd[2039]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:56.543345 systemd[1]: sshd@2-172.31.29.96:22-147.75.109.163:40880.service: Deactivated successfully. Nov 1 00:14:56.545736 systemd[1]: session-3.scope: Deactivated successfully. Nov 1 00:14:56.548822 systemd-logind[1821]: Session 3 logged out. Waiting for processes to exit. Nov 1 00:14:56.552381 systemd-logind[1821]: Removed session 3. Nov 1 00:14:56.564973 systemd[1]: Started sshd@3-172.31.29.96:22-147.75.109.163:40890.service. Nov 1 00:14:56.735053 sshd[2045]: Accepted publickey for core from 147.75.109.163 port 40890 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:56.737538 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:56.746289 systemd[1]: Started session-4.scope. Nov 1 00:14:56.747166 systemd-logind[1821]: New session 4 of user core. Nov 1 00:14:56.874621 sshd[2045]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:56.879332 systemd[1]: sshd@3-172.31.29.96:22-147.75.109.163:40890.service: Deactivated successfully. Nov 1 00:14:56.880689 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 00:14:56.881757 systemd-logind[1821]: Session 4 logged out. Waiting for processes to exit. Nov 1 00:14:56.883384 systemd-logind[1821]: Removed session 4. Nov 1 00:14:56.902959 systemd[1]: Started sshd@4-172.31.29.96:22-147.75.109.163:40898.service. Nov 1 00:14:57.076271 sshd[2051]: Accepted publickey for core from 147.75.109.163 port 40898 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:57.078769 sshd[2051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:57.086780 systemd-logind[1821]: New session 5 of user core. Nov 1 00:14:57.087718 systemd[1]: Started session-5.scope. Nov 1 00:14:57.212022 sudo[2054]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 00:14:57.213579 sudo[2054]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:57.230315 dbus-daemon[1808]: avc: received setenforce notice (enforcing=1) Nov 1 00:14:57.234033 sudo[2054]: pam_unix(sudo:session): session closed for user root Nov 1 00:14:57.259276 sshd[2051]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:57.264185 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 00:14:57.265388 systemd-logind[1821]: Session 5 logged out. Waiting for processes to exit. Nov 1 00:14:57.265771 systemd[1]: sshd@4-172.31.29.96:22-147.75.109.163:40898.service: Deactivated successfully. Nov 1 00:14:57.268327 systemd-logind[1821]: Removed session 5. Nov 1 00:14:57.289813 systemd[1]: Started sshd@5-172.31.29.96:22-147.75.109.163:40912.service. Nov 1 00:14:57.464058 sshd[2058]: Accepted publickey for core from 147.75.109.163 port 40912 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:57.465943 sshd[2058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:57.474271 systemd-logind[1821]: New session 6 of user core. Nov 1 00:14:57.474961 systemd[1]: Started session-6.scope. Nov 1 00:14:57.583896 sudo[2062]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 00:14:57.584587 sudo[2062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:57.589862 sudo[2062]: pam_unix(sudo:session): session closed for user root Nov 1 00:14:57.599253 sudo[2061]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 00:14:57.599790 sudo[2061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:57.622644 kernel: kauditd_printk_skb: 111 callbacks suppressed Nov 1 00:14:57.622773 kernel: audit: type=1305 audit(1761956097.617:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:14:57.617000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:14:57.621090 systemd[1]: Stopping audit-rules.service... Nov 1 00:14:57.626489 auditctl[2065]: No rules Nov 1 00:14:57.617000 audit[2065]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf150780 a2=420 a3=0 items=0 ppid=1 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.627542 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 00:14:57.627878 systemd[1]: Stopped audit-rules.service. Nov 1 00:14:57.638106 kernel: audit: type=1300 audit(1761956097.617:203): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf150780 a2=420 a3=0 items=0 ppid=1 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.639622 systemd[1]: Starting audit-rules.service... Nov 1 00:14:57.617000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:14:57.644788 kernel: audit: type=1327 audit(1761956097.617:203): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:14:57.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.655150 kernel: audit: type=1131 audit(1761956097.625:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.675699 augenrules[2082]: No rules Nov 1 00:14:57.677331 systemd[1]: Finished audit-rules.service. Nov 1 00:14:57.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.686000 audit[2061]: USER_END pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.687377 sudo[2061]: pam_unix(sudo:session): session closed for user root Nov 1 00:14:57.696862 kernel: audit: type=1130 audit(1761956097.676:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.696946 kernel: audit: type=1106 audit(1761956097.686:206): pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.696992 kernel: audit: type=1104 audit(1761956097.686:207): pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.686000 audit[2061]: CRED_DISP pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.710710 sshd[2058]: pam_unix(sshd:session): session closed for user core Nov 1 00:14:57.712000 audit[2058]: USER_END pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:57.716296 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 00:14:57.717383 systemd[1]: sshd@5-172.31.29.96:22-147.75.109.163:40912.service: Deactivated successfully. Nov 1 00:14:57.714000 audit[2058]: CRED_DISP pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:57.735116 kernel: audit: type=1106 audit(1761956097.712:208): pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:57.735260 kernel: audit: type=1104 audit(1761956097.714:209): pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:57.735314 kernel: audit: type=1131 audit(1761956097.717:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.96:22-147.75.109.163:40912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.96:22-147.75.109.163:40912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.744693 systemd-logind[1821]: Session 6 logged out. Waiting for processes to exit. Nov 1 00:14:57.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.96:22-147.75.109.163:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:57.752402 systemd[1]: Started sshd@6-172.31.29.96:22-147.75.109.163:40916.service. Nov 1 00:14:57.754846 systemd-logind[1821]: Removed session 6. Nov 1 00:14:57.927000 audit[2088]: USER_ACCT pid=2088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:57.928850 sshd[2088]: Accepted publickey for core from 147.75.109.163 port 40916 ssh2: RSA SHA256:l10clL99NTgBLZDdAUsIsAniCj4DES+0hQanxvSOioM Nov 1 00:14:57.929000 audit[2088]: CRED_ACQ pid=2088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:57.929000 audit[2088]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8a3e850 a2=3 a3=1 items=0 ppid=1 pid=2088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:14:57.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:14:57.931876 sshd[2088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:14:57.940180 systemd-logind[1821]: New session 7 of user core. Nov 1 00:14:57.940711 systemd[1]: Started session-7.scope. Nov 1 00:14:57.949000 audit[2088]: USER_START pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:57.952000 audit[2090]: CRED_ACQ pid=2090 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:14:58.047000 audit[2091]: USER_ACCT pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:58.050280 sudo[2091]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 00:14:58.049000 audit[2091]: CRED_REFR pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:58.051424 sudo[2091]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:14:58.054000 audit[2091]: USER_START pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:14:58.076540 systemd[1]: Starting coreos-metadata.service... Nov 1 00:14:58.243476 coreos-metadata[2095]: Nov 01 00:14:58.243 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Nov 1 00:14:58.244523 coreos-metadata[2095]: Nov 01 00:14:58.244 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Nov 1 00:14:58.245201 coreos-metadata[2095]: Nov 01 00:14:58.244 INFO Fetch successful Nov 1 00:14:58.245476 coreos-metadata[2095]: Nov 01 00:14:58.245 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Nov 1 00:14:58.245774 coreos-metadata[2095]: Nov 01 00:14:58.245 INFO Fetch successful Nov 1 00:14:58.246031 coreos-metadata[2095]: Nov 01 00:14:58.245 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Nov 1 00:14:58.246388 coreos-metadata[2095]: Nov 01 00:14:58.246 INFO Fetch successful Nov 1 00:14:58.246644 coreos-metadata[2095]: Nov 01 00:14:58.246 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Nov 1 00:14:58.246957 coreos-metadata[2095]: Nov 01 00:14:58.246 INFO Fetch successful Nov 1 00:14:58.247247 coreos-metadata[2095]: Nov 01 00:14:58.247 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Nov 1 00:14:58.247504 coreos-metadata[2095]: Nov 01 00:14:58.247 INFO Fetch successful Nov 1 00:14:58.247757 coreos-metadata[2095]: Nov 01 00:14:58.247 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Nov 1 00:14:58.248051 coreos-metadata[2095]: Nov 01 00:14:58.247 INFO Fetch successful Nov 1 00:14:58.248353 coreos-metadata[2095]: Nov 01 00:14:58.248 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Nov 1 00:14:58.248630 coreos-metadata[2095]: Nov 01 00:14:58.248 INFO Fetch successful Nov 1 00:14:58.248881 coreos-metadata[2095]: Nov 01 00:14:58.248 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Nov 1 00:14:58.249186 coreos-metadata[2095]: Nov 01 00:14:58.248 INFO Fetch successful Nov 1 00:14:58.265723 systemd[1]: Finished coreos-metadata.service. Nov 1 00:14:58.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:59.315171 systemd[1]: Stopped kubelet.service. Nov 1 00:14:59.315534 systemd[1]: kubelet.service: Consumed 1.435s CPU time. Nov 1 00:14:59.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:59.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:14:59.319310 systemd[1]: Starting kubelet.service... Nov 1 00:14:59.376205 systemd[1]: Reloading. Nov 1 00:14:59.522256 /usr/lib/systemd/system-generators/torcx-generator[2149]: time="2025-11-01T00:14:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:14:59.534237 /usr/lib/systemd/system-generators/torcx-generator[2149]: time="2025-11-01T00:14:59Z" level=info msg="torcx already run" Nov 1 00:14:59.743607 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:14:59.743658 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:14:59.782018 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:14:59.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit: BPF prog-id=46 op=LOAD Nov 1 00:14:59.942000 audit: BPF prog-id=27 op=UNLOAD Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit: BPF prog-id=47 op=LOAD Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.942000 audit: BPF prog-id=48 op=LOAD Nov 1 00:14:59.942000 audit: BPF prog-id=28 op=UNLOAD Nov 1 00:14:59.942000 audit: BPF prog-id=29 op=UNLOAD Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit: BPF prog-id=49 op=LOAD Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.944000 audit: BPF prog-id=50 op=LOAD Nov 1 00:14:59.944000 audit: BPF prog-id=30 op=UNLOAD Nov 1 00:14:59.944000 audit: BPF prog-id=31 op=UNLOAD Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit: BPF prog-id=51 op=LOAD Nov 1 00:14:59.947000 audit: BPF prog-id=32 op=UNLOAD Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit: BPF prog-id=52 op=LOAD Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit: BPF prog-id=53 op=LOAD Nov 1 00:14:59.948000 audit: BPF prog-id=33 op=UNLOAD Nov 1 00:14:59.948000 audit: BPF prog-id=34 op=UNLOAD Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.949000 audit: BPF prog-id=54 op=LOAD Nov 1 00:14:59.949000 audit: BPF prog-id=44 op=UNLOAD Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit: BPF prog-id=55 op=LOAD Nov 1 00:14:59.954000 audit: BPF prog-id=41 op=UNLOAD Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit: BPF prog-id=56 op=LOAD Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.954000 audit: BPF prog-id=57 op=LOAD Nov 1 00:14:59.954000 audit: BPF prog-id=42 op=UNLOAD Nov 1 00:14:59.954000 audit: BPF prog-id=43 op=UNLOAD Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.958000 audit: BPF prog-id=58 op=LOAD Nov 1 00:14:59.958000 audit: BPF prog-id=35 op=UNLOAD Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.961000 audit: BPF prog-id=59 op=LOAD Nov 1 00:14:59.962000 audit: BPF prog-id=36 op=UNLOAD Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.965000 audit: BPF prog-id=60 op=LOAD Nov 1 00:14:59.965000 audit: BPF prog-id=38 op=UNLOAD Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit: BPF prog-id=61 op=LOAD Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.966000 audit: BPF prog-id=62 op=LOAD Nov 1 00:14:59.966000 audit: BPF prog-id=39 op=UNLOAD Nov 1 00:14:59.966000 audit: BPF prog-id=40 op=UNLOAD Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:14:59.967000 audit: BPF prog-id=63 op=LOAD Nov 1 00:14:59.967000 audit: BPF prog-id=37 op=UNLOAD Nov 1 00:14:59.999807 systemd[1]: Started kubelet.service. Nov 1 00:14:59.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:00.007762 systemd[1]: Stopping kubelet.service... Nov 1 00:15:00.008915 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 00:15:00.009366 systemd[1]: Stopped kubelet.service. Nov 1 00:15:00.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:00.012716 systemd[1]: Starting kubelet.service... Nov 1 00:15:00.329015 systemd[1]: Started kubelet.service. Nov 1 00:15:00.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:00.423318 kubelet[2211]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 00:15:00.423886 kubelet[2211]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:15:00.424171 kubelet[2211]: I1101 00:15:00.424123 2211 server.go:213] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 00:15:01.681996 kubelet[2211]: I1101 00:15:01.681922 2211 server.go:529] "Kubelet version" kubeletVersion="v1.34.1" Nov 1 00:15:01.681996 kubelet[2211]: I1101 00:15:01.681974 2211 server.go:531] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 00:15:01.684853 kubelet[2211]: I1101 00:15:01.684805 2211 watchdog_linux.go:95] "Systemd watchdog is not enabled" Nov 1 00:15:01.684853 kubelet[2211]: I1101 00:15:01.684845 2211 watchdog_linux.go:137] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 00:15:01.685326 kubelet[2211]: I1101 00:15:01.685282 2211 server.go:956] "Client rotation is on, will bootstrap in background" Nov 1 00:15:01.692673 kubelet[2211]: I1101 00:15:01.692634 2211 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 00:15:01.700600 kubelet[2211]: E1101 00:15:01.700549 2211 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 00:15:01.700861 kubelet[2211]: I1101 00:15:01.700838 2211 server.go:1400] "CRI implementation should be updated to support RuntimeConfig. Falling back to using cgroupDriver from kubelet config." Nov 1 00:15:01.706359 kubelet[2211]: I1101 00:15:01.706318 2211 server.go:781] "--cgroups-per-qos enabled, but --cgroup-root was not specified. Defaulting to /" Nov 1 00:15:01.707016 kubelet[2211]: I1101 00:15:01.706960 2211 container_manager_linux.go:270] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 00:15:01.707650 kubelet[2211]: I1101 00:15:01.707208 2211 container_manager_linux.go:275] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.29.96","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 00:15:01.707916 kubelet[2211]: I1101 00:15:01.707891 2211 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 00:15:01.708034 kubelet[2211]: I1101 00:15:01.708014 2211 container_manager_linux.go:306] "Creating device plugin manager" Nov 1 00:15:01.708363 kubelet[2211]: I1101 00:15:01.708338 2211 container_manager_linux.go:315] "Creating Dynamic Resource Allocation (DRA) manager" Nov 1 00:15:01.713782 kubelet[2211]: I1101 00:15:01.713745 2211 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:15:01.716562 kubelet[2211]: I1101 00:15:01.716533 2211 kubelet.go:475] "Attempting to sync node with API server" Nov 1 00:15:01.716747 kubelet[2211]: I1101 00:15:01.716723 2211 kubelet.go:376] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 00:15:01.716880 kubelet[2211]: I1101 00:15:01.716859 2211 kubelet.go:387] "Adding apiserver pod source" Nov 1 00:15:01.717002 kubelet[2211]: I1101 00:15:01.716980 2211 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 00:15:01.717208 kubelet[2211]: E1101 00:15:01.717142 2211 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:01.717374 kubelet[2211]: E1101 00:15:01.717227 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:01.719788 kubelet[2211]: I1101 00:15:01.719753 2211 kuberuntime_manager.go:291] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 00:15:01.721087 kubelet[2211]: I1101 00:15:01.721045 2211 kubelet.go:940] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Nov 1 00:15:01.721243 kubelet[2211]: I1101 00:15:01.721221 2211 kubelet.go:964] "Not starting PodCertificateRequest manager because we are in static kubelet mode or the PodCertificateProjection feature gate is disabled" Nov 1 00:15:01.721397 kubelet[2211]: W1101 00:15:01.721377 2211 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 00:15:01.725597 kubelet[2211]: I1101 00:15:01.725566 2211 server.go:1262] "Started kubelet" Nov 1 00:15:01.726000 audit[2211]: AVC avc: denied { mac_admin } for pid=2211 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:01.726000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:15:01.726000 audit[2211]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a7f680 a1=400065b758 a2=4000a7f650 a3=25 items=0 ppid=1 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.726000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:15:01.728122 kubelet[2211]: I1101 00:15:01.728044 2211 kubelet.go:1567] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 00:15:01.727000 audit[2211]: AVC avc: denied { mac_admin } for pid=2211 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:01.727000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:15:01.727000 audit[2211]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000b3160 a1=400065b770 a2=4000a7f710 a3=25 items=0 ppid=1 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.727000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:15:01.728811 kubelet[2211]: I1101 00:15:01.728782 2211 kubelet.go:1571] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 00:15:01.729100 kubelet[2211]: I1101 00:15:01.729042 2211 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 00:15:01.742813 kubelet[2211]: E1101 00:15:01.740206 2211 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.29.96.1873b9bd412e4f2f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.29.96,UID:172.31.29.96,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.29.96,},FirstTimestamp:2025-11-01 00:15:01.725507375 +0000 UTC m=+1.387483643,LastTimestamp:2025-11-01 00:15:01.725507375 +0000 UTC m=+1.387483643,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.29.96,}" Nov 1 00:15:01.743106 kubelet[2211]: E1101 00:15:01.742907 2211 reflector.go:205] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Nov 1 00:15:01.743196 kubelet[2211]: E1101 00:15:01.743156 2211 reflector.go:205] "Failed to watch" err="failed to list *v1.Node: nodes \"172.31.29.96\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Nov 1 00:15:01.751045 kubelet[2211]: E1101 00:15:01.750985 2211 kubelet.go:1615] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Nov 1 00:15:01.752144 kubelet[2211]: I1101 00:15:01.752021 2211 ratelimit.go:56] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 00:15:01.752439 kubelet[2211]: I1101 00:15:01.752388 2211 server_v1.go:49] "podresources" method="list" useActivePods=true Nov 1 00:15:01.754772 kubelet[2211]: I1101 00:15:01.754732 2211 server.go:249] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 00:15:01.755644 kubelet[2211]: I1101 00:15:01.753265 2211 volume_manager.go:313] "Starting Kubelet Volume Manager" Nov 1 00:15:01.760281 kubelet[2211]: I1101 00:15:01.753281 2211 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Nov 1 00:15:01.762808 kubelet[2211]: E1101 00:15:01.753530 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:01.775650 kubelet[2211]: I1101 00:15:01.753190 2211 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 00:15:01.777140 kubelet[2211]: E1101 00:15:01.759767 2211 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.29.96.1873b9bd42b2903b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.29.96,UID:172.31.29.96,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.29.96,},FirstTimestamp:2025-11-01 00:15:01.750951995 +0000 UTC m=+1.412928263,LastTimestamp:2025-11-01 00:15:01.750951995 +0000 UTC m=+1.412928263,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.29.96,}" Nov 1 00:15:01.780669 kubelet[2211]: I1101 00:15:01.780635 2211 server.go:310] "Adding debug handlers to kubelet server" Nov 1 00:15:01.784017 kubelet[2211]: I1101 00:15:01.761225 2211 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 00:15:01.784689 kubelet[2211]: I1101 00:15:01.760522 2211 reconciler.go:29] "Reconciler: start to sync state" Nov 1 00:15:01.785801 kubelet[2211]: I1101 00:15:01.785765 2211 factory.go:223] Registration of the containerd container factory successfully Nov 1 00:15:01.786040 kubelet[2211]: I1101 00:15:01.786019 2211 factory.go:223] Registration of the systemd container factory successfully Nov 1 00:15:01.786408 kubelet[2211]: I1101 00:15:01.786374 2211 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 00:15:01.793500 kubelet[2211]: E1101 00:15:01.793419 2211 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.29.96\" not found" node="172.31.29.96" Nov 1 00:15:01.810642 kubelet[2211]: I1101 00:15:01.810608 2211 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 00:15:01.811673 kubelet[2211]: I1101 00:15:01.811635 2211 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 00:15:01.811925 kubelet[2211]: I1101 00:15:01.811904 2211 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:15:01.815448 kubelet[2211]: I1101 00:15:01.815412 2211 policy_none.go:49] "None policy: Start" Nov 1 00:15:01.815694 kubelet[2211]: I1101 00:15:01.815671 2211 memory_manager.go:187] "Starting memorymanager" policy="None" Nov 1 00:15:01.815813 kubelet[2211]: I1101 00:15:01.815791 2211 state_mem.go:36] "Initializing new in-memory state store" logger="Memory Manager state checkpoint" Nov 1 00:15:01.815000 audit[2237]: NETFILTER_CFG table=mangle:2 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:01.815000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd1b34e80 a2=0 a3=1 items=0 ppid=2211 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.815000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:15:01.816998 kubelet[2211]: I1101 00:15:01.816935 2211 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv6" Nov 1 00:15:01.818269 kubelet[2211]: I1101 00:15:01.818238 2211 policy_none.go:47] "Start" Nov 1 00:15:01.820000 audit[2238]: NETFILTER_CFG table=mangle:3 family=2 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.820000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeb5ba020 a2=0 a3=1 items=0 ppid=2211 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:15:01.822000 audit[2240]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.822000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd9d5f000 a2=0 a3=1 items=0 ppid=2211 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:15:01.823000 audit[2239]: NETFILTER_CFG table=mangle:5 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:01.823000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5916040 a2=0 a3=1 items=0 ppid=2211 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:15:01.829000 audit[2243]: NETFILTER_CFG table=nat:6 family=10 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:01.829000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff053dd10 a2=0 a3=1 items=0 ppid=2211 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:15:01.834000 audit[2245]: NETFILTER_CFG table=filter:7 family=10 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:01.834000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff862dd70 a2=0 a3=1 items=0 ppid=2211 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:15:01.844705 systemd[1]: Created slice kubepods.slice. Nov 1 00:15:01.855837 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 00:15:01.866000 audit[2091]: USER_END pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:15:01.866000 audit[2091]: CRED_DISP pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:15:01.867376 sudo[2091]: pam_unix(sudo:session): session closed for user root Nov 1 00:15:01.834000 audit[2242]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.834000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9be9780 a2=0 a3=1 items=0 ppid=2211 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:15:01.872248 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 00:15:01.875770 kubelet[2211]: E1101 00:15:01.875734 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:01.881000 audit[2250]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.881000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcab33e80 a2=0 a3=1 items=0 ppid=2211 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:15:01.887215 kubelet[2211]: E1101 00:15:01.887170 2211 manager.go:513] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Nov 1 00:15:01.886000 audit[2211]: AVC avc: denied { mac_admin } for pid=2211 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:01.886000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:15:01.886000 audit[2211]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dea0f0 a1=4000df2078 a2=4000dea0c0 a3=25 items=0 ppid=1 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.886000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:15:01.887698 kubelet[2211]: E1101 00:15:01.887275 2211 server.go:96] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Nov 1 00:15:01.887698 kubelet[2211]: I1101 00:15:01.887477 2211 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 00:15:01.887698 kubelet[2211]: I1101 00:15:01.887515 2211 container_log_manager.go:146] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 00:15:01.891607 sshd[2088]: pam_unix(sshd:session): session closed for user core Nov 1 00:15:01.893660 kubelet[2211]: I1101 00:15:01.893532 2211 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 00:15:01.893000 audit[2088]: USER_END pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:15:01.893000 audit[2088]: CRED_DISP pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:15:01.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.96:22-147.75.109.163:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:01.897285 systemd[1]: sshd@6-172.31.29.96:22-147.75.109.163:40916.service: Deactivated successfully. Nov 1 00:15:01.898555 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 00:15:01.900189 kubelet[2211]: E1101 00:15:01.899719 2211 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 00:15:01.900189 kubelet[2211]: E1101 00:15:01.899789 2211 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.29.96\" not found" Nov 1 00:15:01.900769 systemd-logind[1821]: Session 7 logged out. Waiting for processes to exit. Nov 1 00:15:01.905411 systemd-logind[1821]: Removed session 7. Nov 1 00:15:01.964000 audit[2256]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.964000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc37b3270 a2=0 a3=1 items=0 ppid=2211 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F380000002D2D737263003132372E Nov 1 00:15:01.969256 kubelet[2211]: I1101 00:15:01.969219 2211 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv4" Nov 1 00:15:01.969408 kubelet[2211]: I1101 00:15:01.969388 2211 status_manager.go:244] "Starting to sync pod status with apiserver" Nov 1 00:15:01.969739 kubelet[2211]: I1101 00:15:01.969719 2211 kubelet.go:2427] "Starting kubelet main sync loop" Nov 1 00:15:01.970012 kubelet[2211]: E1101 00:15:01.969986 2211 kubelet.go:2451] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Nov 1 00:15:01.972000 audit[2257]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.972000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0109cc0 a2=0 a3=1 items=0 ppid=2211 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:15:01.975000 audit[2258]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.975000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc270abf0 a2=0 a3=1 items=0 ppid=2211 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:15:01.976000 audit[2259]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:01.976000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd955e690 a2=0 a3=1 items=0 ppid=2211 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:01.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:15:01.989189 kubelet[2211]: I1101 00:15:01.989156 2211 kubelet_node_status.go:75] "Attempting to register node" node="172.31.29.96" Nov 1 00:15:01.997183 kubelet[2211]: I1101 00:15:01.997147 2211 kubelet_node_status.go:78] "Successfully registered node" node="172.31.29.96" Nov 1 00:15:01.997400 kubelet[2211]: E1101 00:15:01.997375 2211 kubelet_node_status.go:486] "Error updating node status, will retry" err="error getting node \"172.31.29.96\": node \"172.31.29.96\" not found" Nov 1 00:15:02.043313 kubelet[2211]: E1101 00:15:02.043274 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:02.144209 kubelet[2211]: E1101 00:15:02.144171 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:02.245559 kubelet[2211]: E1101 00:15:02.245433 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:02.346312 kubelet[2211]: E1101 00:15:02.346280 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:02.447232 kubelet[2211]: E1101 00:15:02.447175 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:02.548092 kubelet[2211]: E1101 00:15:02.547978 2211 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"172.31.29.96\" not found" Nov 1 00:15:02.650268 kubelet[2211]: I1101 00:15:02.650215 2211 kuberuntime_manager.go:1828] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Nov 1 00:15:02.650841 env[1828]: time="2025-11-01T00:15:02.650782951Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 00:15:02.651815 kubelet[2211]: I1101 00:15:02.651786 2211 kubelet_network.go:47] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Nov 1 00:15:02.688559 kubelet[2211]: I1101 00:15:02.688526 2211 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Nov 1 00:15:02.689787 kubelet[2211]: I1101 00:15:02.689462 2211 reflector.go:568] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Nov 1 00:15:02.689787 kubelet[2211]: I1101 00:15:02.689514 2211 reflector.go:568] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Nov 1 00:15:02.689962 kubelet[2211]: I1101 00:15:02.689694 2211 reflector.go:568] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Nov 1 00:15:02.717653 kubelet[2211]: I1101 00:15:02.717626 2211 apiserver.go:52] "Watching apiserver" Nov 1 00:15:02.717820 kubelet[2211]: E1101 00:15:02.717646 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:02.746312 kubelet[2211]: E1101 00:15:02.746267 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:02.755490 systemd[1]: Created slice kubepods-besteffort-pod79a99d3f_29f5_4732_89a9_5b655d7e7b6e.slice. Nov 1 00:15:02.767387 kubelet[2211]: I1101 00:15:02.767348 2211 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Nov 1 00:15:02.772229 systemd[1]: Created slice kubepods-besteffort-podcb1a0137_14d9_4de6_bece_f8699e9dbced.slice. Nov 1 00:15:02.792252 kubelet[2211]: I1101 00:15:02.792210 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-node-certs\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.792510 kubelet[2211]: I1101 00:15:02.792484 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a-socket-dir\") pod \"csi-node-driver-tcgnr\" (UID: \"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a\") " pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:15:02.792705 kubelet[2211]: I1101 00:15:02.792678 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a-varrun\") pod \"csi-node-driver-tcgnr\" (UID: \"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a\") " pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:15:02.792867 kubelet[2211]: I1101 00:15:02.792842 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-cni-bin-dir\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.793030 kubelet[2211]: I1101 00:15:02.793005 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-var-run-calico\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.793227 kubelet[2211]: I1101 00:15:02.793201 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-766nh\" (UniqueName: \"kubernetes.io/projected/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-kube-api-access-766nh\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.793411 kubelet[2211]: I1101 00:15:02.793386 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a-registration-dir\") pod \"csi-node-driver-tcgnr\" (UID: \"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a\") " pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:15:02.793585 kubelet[2211]: I1101 00:15:02.793561 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cb1a0137-14d9-4de6-bece-f8699e9dbced-lib-modules\") pod \"kube-proxy-mh5bt\" (UID: \"cb1a0137-14d9-4de6-bece-f8699e9dbced\") " pod="kube-system/kube-proxy-mh5bt" Nov 1 00:15:02.793755 kubelet[2211]: I1101 00:15:02.793726 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-cni-net-dir\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.793919 kubelet[2211]: I1101 00:15:02.793895 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-flexvol-driver-host\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.794125 kubelet[2211]: I1101 00:15:02.794056 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-lib-modules\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.794308 kubelet[2211]: I1101 00:15:02.794282 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a-kubelet-dir\") pod \"csi-node-driver-tcgnr\" (UID: \"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a\") " pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:15:02.794479 kubelet[2211]: I1101 00:15:02.794447 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cb1a0137-14d9-4de6-bece-f8699e9dbced-xtables-lock\") pod \"kube-proxy-mh5bt\" (UID: \"cb1a0137-14d9-4de6-bece-f8699e9dbced\") " pod="kube-system/kube-proxy-mh5bt" Nov 1 00:15:02.794624 kubelet[2211]: I1101 00:15:02.794598 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-policysync\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.794787 kubelet[2211]: I1101 00:15:02.794761 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-tigera-ca-bundle\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.794941 kubelet[2211]: I1101 00:15:02.794913 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-var-lib-calico\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.795111 kubelet[2211]: I1101 00:15:02.795082 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-xtables-lock\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.795268 kubelet[2211]: I1101 00:15:02.795242 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rb2pv\" (UniqueName: \"kubernetes.io/projected/fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a-kube-api-access-rb2pv\") pod \"csi-node-driver-tcgnr\" (UID: \"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a\") " pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:15:02.795410 kubelet[2211]: I1101 00:15:02.795385 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cb1a0137-14d9-4de6-bece-f8699e9dbced-kube-proxy\") pod \"kube-proxy-mh5bt\" (UID: \"cb1a0137-14d9-4de6-bece-f8699e9dbced\") " pod="kube-system/kube-proxy-mh5bt" Nov 1 00:15:02.795583 kubelet[2211]: I1101 00:15:02.795556 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w8bgq\" (UniqueName: \"kubernetes.io/projected/cb1a0137-14d9-4de6-bece-f8699e9dbced-kube-api-access-w8bgq\") pod \"kube-proxy-mh5bt\" (UID: \"cb1a0137-14d9-4de6-bece-f8699e9dbced\") " pod="kube-system/kube-proxy-mh5bt" Nov 1 00:15:02.795726 kubelet[2211]: I1101 00:15:02.795701 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/79a99d3f-29f5-4732-89a9-5b655d7e7b6e-cni-log-dir\") pod \"calico-node-swtj8\" (UID: \"79a99d3f-29f5-4732-89a9-5b655d7e7b6e\") " pod="calico-system/calico-node-swtj8" Nov 1 00:15:02.902364 kubelet[2211]: E1101 00:15:02.902309 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.902364 kubelet[2211]: W1101 00:15:02.902348 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.902670 kubelet[2211]: E1101 00:15:02.902382 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.902737 kubelet[2211]: E1101 00:15:02.902711 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.902737 kubelet[2211]: W1101 00:15:02.902729 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.902866 kubelet[2211]: E1101 00:15:02.902750 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.903091 kubelet[2211]: E1101 00:15:02.903036 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.903091 kubelet[2211]: W1101 00:15:02.903084 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.903240 kubelet[2211]: E1101 00:15:02.903109 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.903706 kubelet[2211]: E1101 00:15:02.903674 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.903816 kubelet[2211]: W1101 00:15:02.903704 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.903816 kubelet[2211]: E1101 00:15:02.903729 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.904133 kubelet[2211]: E1101 00:15:02.904103 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.904227 kubelet[2211]: W1101 00:15:02.904132 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.904227 kubelet[2211]: E1101 00:15:02.904155 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.904624 kubelet[2211]: I1101 00:15:02.904587 2211 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 00:15:02.918238 kubelet[2211]: E1101 00:15:02.918204 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.918421 kubelet[2211]: W1101 00:15:02.918395 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.918569 kubelet[2211]: E1101 00:15:02.918543 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.974737 kubelet[2211]: E1101 00:15:02.974672 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.974737 kubelet[2211]: W1101 00:15:02.974727 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.974964 kubelet[2211]: E1101 00:15:02.974761 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.975954 kubelet[2211]: E1101 00:15:02.975905 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.975954 kubelet[2211]: W1101 00:15:02.975940 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.976275 kubelet[2211]: E1101 00:15:02.975972 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:02.979490 kubelet[2211]: E1101 00:15:02.979435 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:15:02.979490 kubelet[2211]: W1101 00:15:02.979474 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:15:02.979707 kubelet[2211]: E1101 00:15:02.979520 2211 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:15:03.085314 env[1828]: time="2025-11-01T00:15:03.084516308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-swtj8,Uid:79a99d3f-29f5-4732-89a9-5b655d7e7b6e,Namespace:calico-system,Attempt:0,}" Nov 1 00:15:03.087780 env[1828]: time="2025-11-01T00:15:03.087699708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mh5bt,Uid:cb1a0137-14d9-4de6-bece-f8699e9dbced,Namespace:kube-system,Attempt:0,}" Nov 1 00:15:03.612850 env[1828]: time="2025-11-01T00:15:03.612769671Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.616415 env[1828]: time="2025-11-01T00:15:03.616348367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.617875 env[1828]: time="2025-11-01T00:15:03.617821680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.619873 env[1828]: time="2025-11-01T00:15:03.619825690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.623553 env[1828]: time="2025-11-01T00:15:03.623505027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.627773 env[1828]: time="2025-11-01T00:15:03.627723708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.632278 env[1828]: time="2025-11-01T00:15:03.632201276Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.633645 env[1828]: time="2025-11-01T00:15:03.633590331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:03.664041 env[1828]: time="2025-11-01T00:15:03.663882495Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:03.664715 env[1828]: time="2025-11-01T00:15:03.663982246Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:03.664715 env[1828]: time="2025-11-01T00:15:03.664042326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:03.664931 env[1828]: time="2025-11-01T00:15:03.664776766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a6f3253c16b20a6bdd7fffb342eaf952b0298d2a0fd8b5b6d69efa016cb873d pid=2291 runtime=io.containerd.runc.v2 Nov 1 00:15:03.667156 env[1828]: time="2025-11-01T00:15:03.666875255Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:03.667156 env[1828]: time="2025-11-01T00:15:03.666952774Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:03.667156 env[1828]: time="2025-11-01T00:15:03.666981072Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:03.667445 env[1828]: time="2025-11-01T00:15:03.667274214Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed pid=2292 runtime=io.containerd.runc.v2 Nov 1 00:15:03.700321 systemd[1]: Started cri-containerd-0a6f3253c16b20a6bdd7fffb342eaf952b0298d2a0fd8b5b6d69efa016cb873d.scope. Nov 1 00:15:03.706464 systemd[1]: Started cri-containerd-e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed.scope. Nov 1 00:15:03.718312 kubelet[2211]: E1101 00:15:03.718237 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:03.758572 kernel: kauditd_printk_skb: 276 callbacks suppressed Nov 1 00:15:03.758702 kernel: audit: type=1400 audit(1761956103.754:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.774491 kernel: audit: type=1400 audit(1761956103.754:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.783424 kernel: audit: type=1400 audit(1761956103.755:454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.792145 kernel: audit: type=1400 audit(1761956103.755:455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.792242 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:15:03.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.804292 kernel: audit: type=1400 audit(1761956103.755:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.804391 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Nov 1 00:15:03.804449 kernel: audit: type=1400 audit(1761956103.755:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.813591 kernel: audit: backlog limit exceeded Nov 1 00:15:03.816640 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:15:03.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.757000 audit: BPF prog-id=64 op=LOAD Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2291 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366633323533633136623230613662646437666666623334326561 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2291 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366633323533633136623230613662646437666666623334326561 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.765000 audit: BPF prog-id=65 op=LOAD Nov 1 00:15:03.765000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2291 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366633323533633136623230613662646437666666623334326561 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.773000 audit: BPF prog-id=66 op=LOAD Nov 1 00:15:03.773000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2291 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366633323533633136623230613662646437666666623334326561 Nov 1 00:15:03.773000 audit: BPF prog-id=66 op=UNLOAD Nov 1 00:15:03.774000 audit: BPF prog-id=65 op=UNLOAD Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.775000 audit: BPF prog-id=67 op=LOAD Nov 1 00:15:03.775000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2291 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366633323533633136623230613662646437666666623334326561 Nov 1 00:15:03.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.820000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.820000 audit[2310]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2292 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373732353463386634366265656163376531663330626635613261 Nov 1 00:15:03.820000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.820000 audit[2310]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2292 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373732353463386634366265656163376531663330626635613261 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit: BPF prog-id=69 op=LOAD Nov 1 00:15:03.821000 audit[2310]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2292 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373732353463386634366265656163376531663330626635613261 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.821000 audit: BPF prog-id=70 op=LOAD Nov 1 00:15:03.821000 audit[2310]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2292 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373732353463386634366265656163376531663330626635613261 Nov 1 00:15:03.822000 audit: BPF prog-id=70 op=UNLOAD Nov 1 00:15:03.822000 audit: BPF prog-id=69 op=UNLOAD Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:03.822000 audit: BPF prog-id=71 op=LOAD Nov 1 00:15:03.822000 audit[2310]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2292 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:03.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373732353463386634366265656163376531663330626635613261 Nov 1 00:15:03.856589 env[1828]: time="2025-11-01T00:15:03.856504332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-swtj8,Uid:79a99d3f-29f5-4732-89a9-5b655d7e7b6e,Namespace:calico-system,Attempt:0,} returns sandbox id \"e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed\"" Nov 1 00:15:03.861396 env[1828]: time="2025-11-01T00:15:03.861325572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 00:15:03.867312 env[1828]: time="2025-11-01T00:15:03.867175164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mh5bt,Uid:cb1a0137-14d9-4de6-bece-f8699e9dbced,Namespace:kube-system,Attempt:0,} returns sandbox id \"0a6f3253c16b20a6bdd7fffb342eaf952b0298d2a0fd8b5b6d69efa016cb873d\"" Nov 1 00:15:03.918727 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4039961618.mount: Deactivated successfully. Nov 1 00:15:04.718864 kubelet[2211]: E1101 00:15:04.718804 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:04.970395 kubelet[2211]: E1101 00:15:04.970225 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:05.158988 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3231528740.mount: Deactivated successfully. Nov 1 00:15:05.326974 env[1828]: time="2025-11-01T00:15:05.326905822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:05.329633 env[1828]: time="2025-11-01T00:15:05.329530261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:05.333100 env[1828]: time="2025-11-01T00:15:05.332320068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:05.336031 env[1828]: time="2025-11-01T00:15:05.335981247Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640\"" Nov 1 00:15:05.336346 env[1828]: time="2025-11-01T00:15:05.334925486Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:05.340248 env[1828]: time="2025-11-01T00:15:05.340194850Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\"" Nov 1 00:15:05.346300 env[1828]: time="2025-11-01T00:15:05.346247503Z" level=info msg="CreateContainer within sandbox \"e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 00:15:05.374854 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3871861791.mount: Deactivated successfully. Nov 1 00:15:05.382379 env[1828]: time="2025-11-01T00:15:05.382318316Z" level=info msg="CreateContainer within sandbox \"e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5\"" Nov 1 00:15:05.384189 env[1828]: time="2025-11-01T00:15:05.384121436Z" level=info msg="StartContainer for \"579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5\"" Nov 1 00:15:05.425142 systemd[1]: Started cri-containerd-579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5.scope. Nov 1 00:15:05.469000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.469000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2292 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:05.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396435383336336232396530643037333139643661306261393131 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.470000 audit: BPF prog-id=72 op=LOAD Nov 1 00:15:05.470000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2292 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:05.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396435383336336232396530643037333139643661306261393131 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.471000 audit: BPF prog-id=73 op=LOAD Nov 1 00:15:05.471000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2292 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:05.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396435383336336232396530643037333139643661306261393131 Nov 1 00:15:05.472000 audit: BPF prog-id=73 op=UNLOAD Nov 1 00:15:05.472000 audit: BPF prog-id=72 op=UNLOAD Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:05.472000 audit: BPF prog-id=74 op=LOAD Nov 1 00:15:05.472000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2292 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:05.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396435383336336232396530643037333139643661306261393131 Nov 1 00:15:05.502455 env[1828]: time="2025-11-01T00:15:05.502287838Z" level=info msg="StartContainer for \"579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5\" returns successfully" Nov 1 00:15:05.532507 systemd[1]: cri-containerd-579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5.scope: Deactivated successfully. Nov 1 00:15:05.535000 audit: BPF prog-id=74 op=UNLOAD Nov 1 00:15:05.614968 env[1828]: time="2025-11-01T00:15:05.614803223Z" level=info msg="shim disconnected" id=579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5 Nov 1 00:15:05.614968 env[1828]: time="2025-11-01T00:15:05.614886442Z" level=warning msg="cleaning up after shim disconnected" id=579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5 namespace=k8s.io Nov 1 00:15:05.614968 env[1828]: time="2025-11-01T00:15:05.614909582Z" level=info msg="cleaning up dead shim" Nov 1 00:15:05.631716 env[1828]: time="2025-11-01T00:15:05.631639998Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:15:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2406 runtime=io.containerd.runc.v2\n" Nov 1 00:15:05.719711 kubelet[2211]: E1101 00:15:05.719586 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:06.092324 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-579d58363b29e0d07319d6a0ba9114e6906ab9f6ef7582b9a5a2c897557c46d5-rootfs.mount: Deactivated successfully. Nov 1 00:15:06.637800 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2385805109.mount: Deactivated successfully. Nov 1 00:15:06.720722 kubelet[2211]: E1101 00:15:06.720666 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:06.971386 kubelet[2211]: E1101 00:15:06.971225 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:07.293564 env[1828]: time="2025-11-01T00:15:07.293415116Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:07.296342 env[1828]: time="2025-11-01T00:15:07.296275217Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05baa95f5142d87797a2bc1d3d11edfb0bf0a9236d436243d15061fae8b58cb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:07.298902 env[1828]: time="2025-11-01T00:15:07.298837077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:07.310980 env[1828]: time="2025-11-01T00:15:07.310929372Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:913cc83ca0b5588a81d86ce8eedeb3ed1e9c1326e81852a1ea4f622b74ff749a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:07.312374 env[1828]: time="2025-11-01T00:15:07.312316517Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\" returns image reference \"sha256:05baa95f5142d87797a2bc1d3d11edfb0bf0a9236d436243d15061fae8b58cb9\"" Nov 1 00:15:07.315550 env[1828]: time="2025-11-01T00:15:07.315499436Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 00:15:07.319160 env[1828]: time="2025-11-01T00:15:07.319092628Z" level=info msg="CreateContainer within sandbox \"0a6f3253c16b20a6bdd7fffb342eaf952b0298d2a0fd8b5b6d69efa016cb873d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 00:15:07.345544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1350771840.mount: Deactivated successfully. Nov 1 00:15:07.355798 env[1828]: time="2025-11-01T00:15:07.355689053Z" level=info msg="CreateContainer within sandbox \"0a6f3253c16b20a6bdd7fffb342eaf952b0298d2a0fd8b5b6d69efa016cb873d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fb549326a1cb6f18e6c754c8eb53b71e60ff38f2cd074b048e354458eec52bbc\"" Nov 1 00:15:07.356874 env[1828]: time="2025-11-01T00:15:07.356825827Z" level=info msg="StartContainer for \"fb549326a1cb6f18e6c754c8eb53b71e60ff38f2cd074b048e354458eec52bbc\"" Nov 1 00:15:07.400969 systemd[1]: Started cri-containerd-fb549326a1cb6f18e6c754c8eb53b71e60ff38f2cd074b048e354458eec52bbc.scope. Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2291 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353439333236613163623666313865366337353463386562353362 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit: BPF prog-id=75 op=LOAD Nov 1 00:15:07.452000 audit[2430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2291 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353439333236613163623666313865366337353463386562353362 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit: BPF prog-id=76 op=LOAD Nov 1 00:15:07.452000 audit[2430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2291 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353439333236613163623666313865366337353463386562353362 Nov 1 00:15:07.452000 audit: BPF prog-id=76 op=UNLOAD Nov 1 00:15:07.452000 audit: BPF prog-id=75 op=UNLOAD Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:07.452000 audit: BPF prog-id=77 op=LOAD Nov 1 00:15:07.452000 audit[2430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2291 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353439333236613163623666313865366337353463386562353362 Nov 1 00:15:07.491439 env[1828]: time="2025-11-01T00:15:07.491315683Z" level=info msg="StartContainer for \"fb549326a1cb6f18e6c754c8eb53b71e60ff38f2cd074b048e354458eec52bbc\" returns successfully" Nov 1 00:15:07.661619 amazon-ssm-agent[1805]: 2025-11-01 00:15:07 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Nov 1 00:15:07.721480 kubelet[2211]: E1101 00:15:07.721392 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:07.808000 audit[2494]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.808000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1c13350 a2=0 a3=1 items=0 ppid=2441 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:15:07.813000 audit[2496]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.813000 audit[2496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc210c080 a2=0 a3=1 items=0 ppid=2441 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:15:07.816000 audit[2495]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:07.816000 audit[2495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdee203b0 a2=0 a3=1 items=0 ppid=2441 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:15:07.820000 audit[2499]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2499 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.820000 audit[2499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb1ae0c0 a2=0 a3=1 items=0 ppid=2441 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:15:07.825000 audit[2500]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:07.825000 audit[2500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea3099f0 a2=0 a3=1 items=0 ppid=2441 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:15:07.827000 audit[2501]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:07.827000 audit[2501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4f8d040 a2=0 a3=1 items=0 ppid=2441 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:15:07.918000 audit[2502]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.918000 audit[2502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffb9a1ed0 a2=0 a3=1 items=0 ppid=2441 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:15:07.925000 audit[2504]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.925000 audit[2504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc865d970 a2=0 a3=1 items=0 ppid=2441 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.925000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73002D Nov 1 00:15:07.932000 audit[2507]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.932000 audit[2507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc35ce0f0 a2=0 a3=1 items=0 ppid=2441 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Nov 1 00:15:07.935000 audit[2508]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.935000 audit[2508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeaf76b70 a2=0 a3=1 items=0 ppid=2441 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:15:07.940000 audit[2510]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.940000 audit[2510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffec0796b0 a2=0 a3=1 items=0 ppid=2441 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:15:07.942000 audit[2511]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2511 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.942000 audit[2511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6b1b630 a2=0 a3=1 items=0 ppid=2441 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:15:07.948000 audit[2513]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.948000 audit[2513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe457450 a2=0 a3=1 items=0 ppid=2441 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:07.958000 audit[2516]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.958000 audit[2516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd97ce920 a2=0 a3=1 items=0 ppid=2441 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:07.961000 audit[2517]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.961000 audit[2517]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeecb4830 a2=0 a3=1 items=0 ppid=2441 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:15:07.966000 audit[2519]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2519 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.966000 audit[2519]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed91ed50 a2=0 a3=1 items=0 ppid=2441 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:15:07.968000 audit[2520]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2520 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.968000 audit[2520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea676780 a2=0 a3=1 items=0 ppid=2441 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:15:07.976000 audit[2522]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.976000 audit[2522]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee38f1a0 a2=0 a3=1 items=0 ppid=2441 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F5859 Nov 1 00:15:07.984000 audit[2525]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2525 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.984000 audit[2525]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc063bc30 a2=0 a3=1 items=0 ppid=2441 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Nov 1 00:15:07.991000 audit[2528]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.991000 audit[2528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff953b320 a2=0 a3=1 items=0 ppid=2441 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Nov 1 00:15:07.995000 audit[2529]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:07.995000 audit[2529]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffca592250 a2=0 a3=1 items=0 ppid=2441 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:07.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:15:08.001000 audit[2531]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:08.001000 audit[2531]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd6f1caf0 a2=0 a3=1 items=0 ppid=2441 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:08.038000 audit[2535]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:08.038000 audit[2535]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe50c05e0 a2=0 a3=1 items=0 ppid=2441 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:08.042000 audit[2536]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:08.042000 audit[2536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd81eceb0 a2=0 a3=1 items=0 ppid=2441 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:15:08.047000 audit[2538]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:15:08.047000 audit[2538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe75aa6e0 a2=0 a3=1 items=0 ppid=2441 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:15:08.092000 audit[2544]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:08.092000 audit[2544]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffccb7ac70 a2=0 a3=1 items=0 ppid=2441 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:08.131000 audit[2544]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:08.131000 audit[2544]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25476 a0=3 a1=ffffccb7ac70 a2=0 a3=1 items=0 ppid=2441 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:08.153000 audit[2553]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2553 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.153000 audit[2553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffda746490 a2=0 a3=1 items=0 ppid=2441 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:15:08.160000 audit[2555]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2555 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.160000 audit[2555]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffeac3e180 a2=0 a3=1 items=0 ppid=2441 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Nov 1 00:15:08.167000 audit[2558]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2558 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.167000 audit[2558]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcd7c7ee0 a2=0 a3=1 items=0 ppid=2441 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C Nov 1 00:15:08.169000 audit[2559]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2559 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.169000 audit[2559]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6cfbeb0 a2=0 a3=1 items=0 ppid=2441 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:15:08.176000 audit[2561]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2561 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.176000 audit[2561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffce81d1d0 a2=0 a3=1 items=0 ppid=2441 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:15:08.178000 audit[2562]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2562 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.178000 audit[2562]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffaa75f70 a2=0 a3=1 items=0 ppid=2441 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:15:08.183000 audit[2564]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2564 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.183000 audit[2564]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd9094460 a2=0 a3=1 items=0 ppid=2441 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:08.190000 audit[2567]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2567 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.190000 audit[2567]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd8afc640 a2=0 a3=1 items=0 ppid=2441 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:08.193000 audit[2568]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2568 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.193000 audit[2568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef33eb60 a2=0 a3=1 items=0 ppid=2441 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:15:08.198000 audit[2570]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.198000 audit[2570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffde167530 a2=0 a3=1 items=0 ppid=2441 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:15:08.200000 audit[2571]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.200000 audit[2571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea907e50 a2=0 a3=1 items=0 ppid=2441 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:15:08.205000 audit[2573]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2573 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.205000 audit[2573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd63924f0 a2=0 a3=1 items=0 ppid=2441 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.205000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Nov 1 00:15:08.212000 audit[2576]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.212000 audit[2576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff6729460 a2=0 a3=1 items=0 ppid=2441 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Nov 1 00:15:08.219000 audit[2579]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2579 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.219000 audit[2579]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffcc6f9f0 a2=0 a3=1 items=0 ppid=2441 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D5052 Nov 1 00:15:08.222000 audit[2580]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2580 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.222000 audit[2580]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc0552a10 a2=0 a3=1 items=0 ppid=2441 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:15:08.226000 audit[2582]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2582 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.226000 audit[2582]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe6efe7d0 a2=0 a3=1 items=0 ppid=2441 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:08.232000 audit[2585]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2585 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.232000 audit[2585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffeb7d5410 a2=0 a3=1 items=0 ppid=2441 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:15:08.235000 audit[2586]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2586 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.235000 audit[2586]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd326f60 a2=0 a3=1 items=0 ppid=2441 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:15:08.242000 audit[2588]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2588 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.242000 audit[2588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff0b0d6b0 a2=0 a3=1 items=0 ppid=2441 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:15:08.246000 audit[2589]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2589 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.246000 audit[2589]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbd3d110 a2=0 a3=1 items=0 ppid=2441 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:15:08.253000 audit[2591]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2591 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.253000 audit[2591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff86b6690 a2=0 a3=1 items=0 ppid=2441 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:15:08.269000 audit[2594]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:15:08.269000 audit[2594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe017cd60 a2=0 a3=1 items=0 ppid=2441 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:15:08.275000 audit[2596]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2596 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:15:08.275000 audit[2596]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc75df2f0 a2=0 a3=1 items=0 ppid=2441 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.275000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:08.276000 audit[2596]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:15:08.276000 audit[2596]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc75df2f0 a2=0 a3=1 items=0 ppid=2441 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.276000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:08.294000 audit[2598]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:08.294000 audit[2598]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffffcf2af80 a2=0 a3=1 items=0 ppid=2441 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:08.303000 audit[2598]: NETFILTER_CFG table=nat:66 family=2 entries=20 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:08.303000 audit[2598]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffcf2af80 a2=0 a3=1 items=0 ppid=2441 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:08.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:08.334741 systemd[1]: run-containerd-runc-k8s.io-fb549326a1cb6f18e6c754c8eb53b71e60ff38f2cd074b048e354458eec52bbc-runc.fgJafM.mount: Deactivated successfully. Nov 1 00:15:08.721805 kubelet[2211]: E1101 00:15:08.721700 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:08.971263 kubelet[2211]: E1101 00:15:08.971180 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:09.325000 audit[2600]: NETFILTER_CFG table=filter:67 family=2 entries=14 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:09.328909 kernel: kauditd_printk_skb: 354 callbacks suppressed Nov 1 00:15:09.329006 kernel: audit: type=1325 audit(1761956109.325:552): table=filter:67 family=2 entries=14 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:09.325000 audit[2600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc5f9e8e0 a2=0 a3=1 items=0 ppid=2441 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.347590 kernel: audit: type=1300 audit(1761956109.325:552): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc5f9e8e0 a2=0 a3=1 items=0 ppid=2441 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:09.353573 kernel: audit: type=1327 audit(1761956109.325:552): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:09.355680 kernel: audit: type=1325 audit(1761956109.354:553): table=nat:68 family=2 entries=20 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:09.354000 audit[2600]: NETFILTER_CFG table=nat:68 family=2 entries=20 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:09.354000 audit[2600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc5f9e8e0 a2=0 a3=1 items=0 ppid=2441 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.374139 kernel: audit: type=1300 audit(1761956109.354:553): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc5f9e8e0 a2=0 a3=1 items=0 ppid=2441 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:09.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:09.380027 kernel: audit: type=1327 audit(1761956109.354:553): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:09.722830 kubelet[2211]: E1101 00:15:09.722637 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:10.723801 kubelet[2211]: E1101 00:15:10.723707 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:10.970422 kubelet[2211]: E1101 00:15:10.970368 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:11.724881 kubelet[2211]: E1101 00:15:11.724835 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:11.730663 env[1828]: time="2025-11-01T00:15:11.730585602Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:11.733004 env[1828]: time="2025-11-01T00:15:11.732941192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:11.735734 env[1828]: time="2025-11-01T00:15:11.735682116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:11.737797 env[1828]: time="2025-11-01T00:15:11.737733373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:11.740330 env[1828]: time="2025-11-01T00:15:11.739159029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2\"" Nov 1 00:15:11.745981 env[1828]: time="2025-11-01T00:15:11.745925776Z" level=info msg="CreateContainer within sandbox \"e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 00:15:11.766887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2587091004.mount: Deactivated successfully. Nov 1 00:15:11.775073 env[1828]: time="2025-11-01T00:15:11.774973966Z" level=info msg="CreateContainer within sandbox \"e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120\"" Nov 1 00:15:11.776097 env[1828]: time="2025-11-01T00:15:11.776026735Z" level=info msg="StartContainer for \"237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120\"" Nov 1 00:15:11.824817 systemd[1]: run-containerd-runc-k8s.io-237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120-runc.431cfN.mount: Deactivated successfully. Nov 1 00:15:11.829323 systemd[1]: Started cri-containerd-237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120.scope. Nov 1 00:15:11.867000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.867000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2292 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.889411 kernel: audit: type=1400 audit(1761956111.867:554): avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.889732 kernel: audit: type=1300 audit(1761956111.867:554): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2292 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376665386633333662613165333861323231396533353762356464 Nov 1 00:15:11.900833 kernel: audit: type=1327 audit(1761956111.867:554): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376665386633333662613165333861323231396533353762356464 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.913115 kernel: audit: type=1400 audit(1761956111.868:555): avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.868000 audit: BPF prog-id=78 op=LOAD Nov 1 00:15:11.868000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2292 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376665386633333662613165333861323231396533353762356464 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.875000 audit: BPF prog-id=79 op=LOAD Nov 1 00:15:11.875000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2292 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376665386633333662613165333861323231396533353762356464 Nov 1 00:15:11.876000 audit: BPF prog-id=79 op=UNLOAD Nov 1 00:15:11.876000 audit: BPF prog-id=78 op=UNLOAD Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:11.876000 audit: BPF prog-id=80 op=LOAD Nov 1 00:15:11.876000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2292 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:11.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376665386633333662613165333861323231396533353762356464 Nov 1 00:15:11.947735 env[1828]: time="2025-11-01T00:15:11.946146189Z" level=info msg="StartContainer for \"237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120\" returns successfully" Nov 1 00:15:12.045135 kubelet[2211]: I1101 00:15:12.044880 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-mh5bt" podStartSLOduration=6.603040033 podStartE2EDuration="10.044859191s" podCreationTimestamp="2025-11-01 00:15:02 +0000 UTC" firstStartedPulling="2025-11-01 00:15:03.872500689 +0000 UTC m=+3.534476921" lastFinishedPulling="2025-11-01 00:15:07.314319847 +0000 UTC m=+6.976296079" observedRunningTime="2025-11-01 00:15:08.055700764 +0000 UTC m=+7.717677020" watchObservedRunningTime="2025-11-01 00:15:12.044859191 +0000 UTC m=+11.706835447" Nov 1 00:15:12.726680 kubelet[2211]: E1101 00:15:12.726552 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:12.971165 kubelet[2211]: E1101 00:15:12.971093 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:13.110504 systemd[1]: cri-containerd-237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120.scope: Deactivated successfully. Nov 1 00:15:13.111019 systemd[1]: cri-containerd-237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120.scope: Consumed 1.076s CPU time. Nov 1 00:15:13.113000 audit: BPF prog-id=80 op=UNLOAD Nov 1 00:15:13.148965 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120-rootfs.mount: Deactivated successfully. Nov 1 00:15:13.192589 kubelet[2211]: I1101 00:15:13.192522 2211 kubelet_node_status.go:439] "Fast updating node status as it just became ready" Nov 1 00:15:13.728336 kubelet[2211]: E1101 00:15:13.728218 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:14.216340 env[1828]: time="2025-11-01T00:15:14.216265477Z" level=info msg="shim disconnected" id=237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120 Nov 1 00:15:14.216340 env[1828]: time="2025-11-01T00:15:14.216335884Z" level=warning msg="cleaning up after shim disconnected" id=237fe8f336ba1e38a2219e357b5dd5c79a763aebaa8741c5107d0fbb62a4d120 namespace=k8s.io Nov 1 00:15:14.217132 env[1828]: time="2025-11-01T00:15:14.216360717Z" level=info msg="cleaning up dead shim" Nov 1 00:15:14.231027 env[1828]: time="2025-11-01T00:15:14.230937690Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:15:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2648 runtime=io.containerd.runc.v2\n" Nov 1 00:15:14.490904 systemd[1]: Created slice kubepods-besteffort-pod14967cb9_9ca0_45f1_b81d_8afa3223333a.slice. Nov 1 00:15:14.606679 kubelet[2211]: I1101 00:15:14.606618 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tthcn\" (UniqueName: \"kubernetes.io/projected/14967cb9-9ca0-45f1-b81d-8afa3223333a-kube-api-access-tthcn\") pod \"nginx-deployment-bb8f74bfb-6nvvc\" (UID: \"14967cb9-9ca0-45f1-b81d-8afa3223333a\") " pod="default/nginx-deployment-bb8f74bfb-6nvvc" Nov 1 00:15:14.733978 kubelet[2211]: E1101 00:15:14.731666 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:14.800319 env[1828]: time="2025-11-01T00:15:14.800145494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-6nvvc,Uid:14967cb9-9ca0-45f1-b81d-8afa3223333a,Namespace:default,Attempt:0,}" Nov 1 00:15:14.945826 env[1828]: time="2025-11-01T00:15:14.945701959Z" level=error msg="Failed to destroy network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:14.950132 env[1828]: time="2025-11-01T00:15:14.949020243Z" level=error msg="encountered an error cleaning up failed sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:14.950132 env[1828]: time="2025-11-01T00:15:14.949192347Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-6nvvc,Uid:14967cb9-9ca0-45f1-b81d-8afa3223333a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:14.951286 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48-shm.mount: Deactivated successfully. Nov 1 00:15:14.952884 kubelet[2211]: E1101 00:15:14.952819 2211 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:14.953037 kubelet[2211]: E1101 00:15:14.952935 2211 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-6nvvc" Nov 1 00:15:14.953037 kubelet[2211]: E1101 00:15:14.952996 2211 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-6nvvc" Nov 1 00:15:14.953290 kubelet[2211]: E1101 00:15:14.953128 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-bb8f74bfb-6nvvc_default(14967cb9-9ca0-45f1-b81d-8afa3223333a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-bb8f74bfb-6nvvc_default(14967cb9-9ca0-45f1-b81d-8afa3223333a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-6nvvc" podUID="14967cb9-9ca0-45f1-b81d-8afa3223333a" Nov 1 00:15:14.979754 systemd[1]: Created slice kubepods-besteffort-podfc5d5266_26b6_4e2b_a46d_b7a1a4ce337a.slice. Nov 1 00:15:14.986915 env[1828]: time="2025-11-01T00:15:14.986860647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcgnr,Uid:fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a,Namespace:calico-system,Attempt:0,}" Nov 1 00:15:15.033691 kubelet[2211]: I1101 00:15:15.033634 2211 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:15:15.034969 env[1828]: time="2025-11-01T00:15:15.034890929Z" level=info msg="StopPodSandbox for \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\"" Nov 1 00:15:15.042234 env[1828]: time="2025-11-01T00:15:15.042162046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 00:15:15.106589 env[1828]: time="2025-11-01T00:15:15.106500387Z" level=error msg="StopPodSandbox for \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\" failed" error="failed to destroy network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:15.106956 kubelet[2211]: E1101 00:15:15.106883 2211 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:15:15.107105 kubelet[2211]: E1101 00:15:15.106968 2211 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48"} Nov 1 00:15:15.107187 kubelet[2211]: E1101 00:15:15.107055 2211 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"14967cb9-9ca0-45f1-b81d-8afa3223333a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:15:15.107187 kubelet[2211]: E1101 00:15:15.107146 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"14967cb9-9ca0-45f1-b81d-8afa3223333a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-6nvvc" podUID="14967cb9-9ca0-45f1-b81d-8afa3223333a" Nov 1 00:15:15.112298 env[1828]: time="2025-11-01T00:15:15.112207530Z" level=error msg="Failed to destroy network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:15.112901 env[1828]: time="2025-11-01T00:15:15.112841860Z" level=error msg="encountered an error cleaning up failed sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:15.113011 env[1828]: time="2025-11-01T00:15:15.112929380Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcgnr,Uid:fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:15.114127 kubelet[2211]: E1101 00:15:15.113350 2211 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:15.114127 kubelet[2211]: E1101 00:15:15.113448 2211 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:15:15.114127 kubelet[2211]: E1101 00:15:15.113482 2211 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:15:15.114436 kubelet[2211]: E1101 00:15:15.113636 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:15.730450 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc-shm.mount: Deactivated successfully. Nov 1 00:15:15.732204 kubelet[2211]: E1101 00:15:15.732054 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:16.043627 kubelet[2211]: I1101 00:15:16.042604 2211 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:15:16.044532 env[1828]: time="2025-11-01T00:15:16.044480916Z" level=info msg="StopPodSandbox for \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\"" Nov 1 00:15:16.109835 env[1828]: time="2025-11-01T00:15:16.109754660Z" level=error msg="StopPodSandbox for \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\" failed" error="failed to destroy network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:15:16.110748 kubelet[2211]: E1101 00:15:16.110400 2211 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:15:16.110748 kubelet[2211]: E1101 00:15:16.110491 2211 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc"} Nov 1 00:15:16.110748 kubelet[2211]: E1101 00:15:16.110579 2211 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:15:16.110748 kubelet[2211]: E1101 00:15:16.110628 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:16.732342 kubelet[2211]: E1101 00:15:16.732268 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:17.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:17.174828 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 1 00:15:17.177646 kernel: kauditd_printk_skb: 40 callbacks suppressed Nov 1 00:15:17.177729 kernel: audit: type=1131 audit(1761956117.174:561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:15:17.203000 audit: BPF prog-id=57 op=UNLOAD Nov 1 00:15:17.203000 audit: BPF prog-id=56 op=UNLOAD Nov 1 00:15:17.207129 kernel: audit: type=1334 audit(1761956117.203:562): prog-id=57 op=UNLOAD Nov 1 00:15:17.210090 kernel: audit: type=1334 audit(1761956117.203:563): prog-id=56 op=UNLOAD Nov 1 00:15:17.203000 audit: BPF prog-id=55 op=UNLOAD Nov 1 00:15:17.214134 kernel: audit: type=1334 audit(1761956117.203:564): prog-id=55 op=UNLOAD Nov 1 00:15:17.733289 kubelet[2211]: E1101 00:15:17.733206 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:18.734149 kubelet[2211]: E1101 00:15:18.734046 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:19.734737 kubelet[2211]: E1101 00:15:19.734644 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:20.735090 kubelet[2211]: E1101 00:15:20.734982 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:21.717886 kubelet[2211]: E1101 00:15:21.717815 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:21.735413 kubelet[2211]: E1101 00:15:21.735330 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:22.572707 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2193890631.mount: Deactivated successfully. Nov 1 00:15:22.635474 env[1828]: time="2025-11-01T00:15:22.635414995Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:22.637794 env[1828]: time="2025-11-01T00:15:22.637730280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:22.640338 env[1828]: time="2025-11-01T00:15:22.640287290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:22.642192 env[1828]: time="2025-11-01T00:15:22.642137847Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:22.644303 env[1828]: time="2025-11-01T00:15:22.644249115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b\"" Nov 1 00:15:22.673704 env[1828]: time="2025-11-01T00:15:22.673647896Z" level=info msg="CreateContainer within sandbox \"e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 00:15:22.697052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1743740613.mount: Deactivated successfully. Nov 1 00:15:22.701284 env[1828]: time="2025-11-01T00:15:22.701189628Z" level=info msg="CreateContainer within sandbox \"e077254c8f46beeac7e1f30bf5a2afff4812bef6aa216f35fa68dcc55c79efed\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f82f63a26cd353998f3aee92e0c5e302cbc6207728d03b66e9b8c2f59f6078d6\"" Nov 1 00:15:22.702539 env[1828]: time="2025-11-01T00:15:22.702488810Z" level=info msg="StartContainer for \"f82f63a26cd353998f3aee92e0c5e302cbc6207728d03b66e9b8c2f59f6078d6\"" Nov 1 00:15:22.734589 systemd[1]: Started cri-containerd-f82f63a26cd353998f3aee92e0c5e302cbc6207728d03b66e9b8c2f59f6078d6.scope. Nov 1 00:15:22.735834 kubelet[2211]: E1101 00:15:22.735449 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2292 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:22.795264 kernel: audit: type=1400 audit(1761956122.785:565): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326636336132366364333533393938663361656539326530633565 Nov 1 00:15:22.818279 kernel: audit: type=1300 audit(1761956122.785:565): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2292 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:22.818404 kernel: audit: type=1327 audit(1761956122.785:565): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326636336132366364333533393938663361656539326530633565 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.826330 kernel: audit: type=1400 audit(1761956122.785:566): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.835844 kernel: audit: type=1400 audit(1761956122.785:566): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.853509 kernel: audit: type=1400 audit(1761956122.785:566): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.853647 kernel: audit: type=1400 audit(1761956122.785:566): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.861831 kernel: audit: type=1400 audit(1761956122.785:566): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.878684 kernel: audit: type=1400 audit(1761956122.785:566): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.878833 kernel: audit: type=1400 audit(1761956122.785:566): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.785000 audit: BPF prog-id=81 op=LOAD Nov 1 00:15:22.785000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2292 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:22.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326636336132366364333533393938663361656539326530633565 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit: BPF prog-id=82 op=LOAD Nov 1 00:15:22.794000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2292 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:22.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326636336132366364333533393938663361656539326530633565 Nov 1 00:15:22.794000 audit: BPF prog-id=82 op=UNLOAD Nov 1 00:15:22.794000 audit: BPF prog-id=81 op=UNLOAD Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:22.794000 audit: BPF prog-id=83 op=LOAD Nov 1 00:15:22.794000 audit[2762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2292 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:22.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326636336132366364333533393938663361656539326530633565 Nov 1 00:15:22.883830 env[1828]: time="2025-11-01T00:15:22.882555863Z" level=info msg="StartContainer for \"f82f63a26cd353998f3aee92e0c5e302cbc6207728d03b66e9b8c2f59f6078d6\" returns successfully" Nov 1 00:15:23.151647 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 00:15:23.151830 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 00:15:23.736117 kubelet[2211]: E1101 00:15:23.736053 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:24.736948 kubelet[2211]: E1101 00:15:24.736881 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:24.747000 audit[2863]: AVC avc: denied { write } for pid=2863 comm="tee" name="fd" dev="proc" ino=15188 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:24.750000 audit[2875]: AVC avc: denied { write } for pid=2875 comm="tee" name="fd" dev="proc" ino=15703 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:24.750000 audit[2875]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc552e7f2 a2=241 a3=1b6 items=1 ppid=2838 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:24.750000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 00:15:24.750000 audit: PATH item=0 name="/dev/fd/63" inode=15177 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:24.747000 audit[2863]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd70907e0 a2=241 a3=1b6 items=1 ppid=2827 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:24.747000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 00:15:24.747000 audit: PATH item=0 name="/dev/fd/63" inode=15692 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:24.747000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:24.759000 audit[2864]: AVC avc: denied { write } for pid=2864 comm="tee" name="fd" dev="proc" ino=15195 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:24.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:24.763000 audit[2874]: AVC avc: denied { write } for pid=2874 comm="tee" name="fd" dev="proc" ino=15198 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:24.759000 audit[2864]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff23957f0 a2=241 a3=1b6 items=1 ppid=2830 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:24.759000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 00:15:24.759000 audit: PATH item=0 name="/dev/fd/63" inode=15176 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:24.759000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:24.763000 audit[2874]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec2aa7f1 a2=241 a3=1b6 items=1 ppid=2834 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:24.769000 audit[2889]: AVC avc: denied { write } for pid=2889 comm="tee" name="fd" dev="proc" ino=15203 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:24.763000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 00:15:24.763000 audit: PATH item=0 name="/dev/fd/63" inode=15178 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:24.763000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:24.774000 audit[2894]: AVC avc: denied { write } for pid=2894 comm="tee" name="fd" dev="proc" ino=15708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:24.774000 audit[2894]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff60897f0 a2=241 a3=1b6 items=1 ppid=2839 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:24.774000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 00:15:24.774000 audit: PATH item=0 name="/dev/fd/63" inode=15699 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:24.774000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:24.769000 audit[2889]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd0927f0 a2=241 a3=1b6 items=1 ppid=2833 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:24.769000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 00:15:24.769000 audit: PATH item=0 name="/dev/fd/63" inode=15179 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:24.769000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:24.781000 audit[2901]: AVC avc: denied { write } for pid=2901 comm="tee" name="fd" dev="proc" ino=15207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:15:24.781000 audit[2901]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffded607e1 a2=241 a3=1b6 items=1 ppid=2837 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:24.781000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 00:15:24.781000 audit: PATH item=0 name="/dev/fd/63" inode=15192 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:15:24.781000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.228000 audit: BPF prog-id=84 op=LOAD Nov 1 00:15:25.228000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffec6a488 a2=98 a3=fffffec6a478 items=0 ppid=2842 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.228000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:25.230000 audit: BPF prog-id=84 op=UNLOAD Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.230000 audit: BPF prog-id=85 op=LOAD Nov 1 00:15:25.230000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffec6a338 a2=74 a3=95 items=0 ppid=2842 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.230000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:25.232000 audit: BPF prog-id=85 op=UNLOAD Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.232000 audit: BPF prog-id=86 op=LOAD Nov 1 00:15:25.232000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffec6a368 a2=40 a3=fffffec6a398 items=0 ppid=2842 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.232000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:25.233000 audit: BPF prog-id=86 op=UNLOAD Nov 1 00:15:25.233000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.233000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffffec6a480 a2=50 a3=0 items=0 ppid=2842 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.233000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.235000 audit: BPF prog-id=87 op=LOAD Nov 1 00:15:25.235000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff6b06128 a2=98 a3=fffff6b06118 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.235000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.237000 audit: BPF prog-id=87 op=UNLOAD Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.237000 audit: BPF prog-id=88 op=LOAD Nov 1 00:15:25.237000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff6b05db8 a2=74 a3=95 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.237000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.238000 audit: BPF prog-id=88 op=UNLOAD Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.238000 audit: BPF prog-id=89 op=LOAD Nov 1 00:15:25.238000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff6b05e18 a2=94 a3=2 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.238000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.238000 audit: BPF prog-id=89 op=UNLOAD Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit: BPF prog-id=90 op=LOAD Nov 1 00:15:25.406000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff6b05dd8 a2=40 a3=fffff6b05e08 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.406000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.406000 audit: BPF prog-id=90 op=UNLOAD Nov 1 00:15:25.406000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.406000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff6b05ef0 a2=50 a3=0 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.406000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff6b05e48 a2=28 a3=fffff6b05f78 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6b05e78 a2=28 a3=fffff6b05fa8 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6b05d28 a2=28 a3=fffff6b05e58 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff6b05e98 a2=28 a3=fffff6b05fc8 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff6b05e78 a2=28 a3=fffff6b05fa8 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff6b05e68 a2=28 a3=fffff6b05f98 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff6b05e98 a2=28 a3=fffff6b05fc8 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6b05e78 a2=28 a3=fffff6b05fa8 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6b05e98 a2=28 a3=fffff6b05fc8 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff6b05e68 a2=28 a3=fffff6b05f98 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.422000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.422000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff6b05ee8 a2=28 a3=fffff6b06028 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.422000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff6b05c20 a2=50 a3=0 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit: BPF prog-id=91 op=LOAD Nov 1 00:15:25.423000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff6b05c28 a2=94 a3=5 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.423000 audit: BPF prog-id=91 op=UNLOAD Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff6b05d30 a2=50 a3=0 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff6b05e78 a2=4 a3=3 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.423000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:25.423000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff6b05e58 a2=94 a3=6 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:25.424000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff6b05628 a2=94 a3=83 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.424000 audit[2936]: AVC avc: denied { confidentiality } for pid=2936 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:25.424000 audit[2936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff6b05628 a2=94 a3=83 items=0 ppid=2842 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit: BPF prog-id=92 op=LOAD Nov 1 00:15:25.448000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf886148 a2=98 a3=ffffdf886138 items=0 ppid=2842 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.448000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:15:25.448000 audit: BPF prog-id=92 op=UNLOAD Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit: BPF prog-id=93 op=LOAD Nov 1 00:15:25.448000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf885ff8 a2=74 a3=95 items=0 ppid=2842 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.448000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:15:25.448000 audit: BPF prog-id=93 op=UNLOAD Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.448000 audit: BPF prog-id=94 op=LOAD Nov 1 00:15:25.448000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf886028 a2=40 a3=ffffdf886058 items=0 ppid=2842 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.448000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:15:25.448000 audit: BPF prog-id=94 op=UNLOAD Nov 1 00:15:25.570830 (udev-worker)[2795]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:25.576056 systemd-networkd[1548]: vxlan.calico: Link UP Nov 1 00:15:25.576090 systemd-networkd[1548]: vxlan.calico: Gained carrier Nov 1 00:15:25.634835 (udev-worker)[2954]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit: BPF prog-id=95 op=LOAD Nov 1 00:15:25.642000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffecca19f8 a2=98 a3=ffffecca19e8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.642000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.642000 audit: BPF prog-id=95 op=UNLOAD Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.642000 audit: BPF prog-id=96 op=LOAD Nov 1 00:15:25.642000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffecca16d8 a2=74 a3=95 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.642000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit: BPF prog-id=96 op=UNLOAD Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit: BPF prog-id=97 op=LOAD Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffecca1738 a2=94 a3=2 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit: BPF prog-id=97 op=UNLOAD Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecca1768 a2=28 a3=ffffecca1898 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecca1798 a2=28 a3=ffffecca18c8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecca1648 a2=28 a3=ffffecca1778 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecca17b8 a2=28 a3=ffffecca18e8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecca1798 a2=28 a3=ffffecca18c8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecca1788 a2=28 a3=ffffecca18b8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecca17b8 a2=28 a3=ffffecca18e8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecca1798 a2=28 a3=ffffecca18c8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecca17b8 a2=28 a3=ffffecca18e8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecca1788 a2=28 a3=ffffecca18b8 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecca1808 a2=28 a3=ffffecca1948 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.643000 audit: BPF prog-id=98 op=LOAD Nov 1 00:15:25.643000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffecca1628 a2=40 a3=ffffecca1658 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.643000 audit: BPF prog-id=98 op=UNLOAD Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffecca1650 a2=50 a3=0 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.644000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffecca1650 a2=50 a3=0 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.644000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit: BPF prog-id=99 op=LOAD Nov 1 00:15:25.644000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffecca0db8 a2=94 a3=2 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.644000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.644000 audit: BPF prog-id=99 op=UNLOAD Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.644000 audit: BPF prog-id=100 op=LOAD Nov 1 00:15:25.644000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffecca0f48 a2=94 a3=30 items=0 ppid=2842 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.644000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.651000 audit: BPF prog-id=101 op=LOAD Nov 1 00:15:25.651000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeec9aba8 a2=98 a3=ffffeec9ab98 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.651000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.652000 audit: BPF prog-id=101 op=UNLOAD Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit: BPF prog-id=102 op=LOAD Nov 1 00:15:25.652000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeec9a838 a2=74 a3=95 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.652000 audit: BPF prog-id=102 op=UNLOAD Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.652000 audit: BPF prog-id=103 op=LOAD Nov 1 00:15:25.652000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeec9a898 a2=94 a3=2 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.652000 audit: BPF prog-id=103 op=UNLOAD Nov 1 00:15:25.737953 kubelet[2211]: E1101 00:15:25.737894 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit: BPF prog-id=104 op=LOAD Nov 1 00:15:25.838000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeec9a858 a2=40 a3=ffffeec9a888 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.838000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.838000 audit: BPF prog-id=104 op=UNLOAD Nov 1 00:15:25.838000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.838000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeec9a970 a2=50 a3=0 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.838000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeec9a8c8 a2=28 a3=ffffeec9a9f8 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeec9a8f8 a2=28 a3=ffffeec9aa28 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeec9a7a8 a2=28 a3=ffffeec9a8d8 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeec9a918 a2=28 a3=ffffeec9aa48 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeec9a8f8 a2=28 a3=ffffeec9aa28 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeec9a8e8 a2=28 a3=ffffeec9aa18 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeec9a918 a2=28 a3=ffffeec9aa48 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeec9a8f8 a2=28 a3=ffffeec9aa28 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeec9a918 a2=28 a3=ffffeec9aa48 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeec9a8e8 a2=28 a3=ffffeec9aa18 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.855000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.855000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeec9a968 a2=28 a3=ffffeec9aaa8 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeec9a6a0 a2=50 a3=0 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit: BPF prog-id=105 op=LOAD Nov 1 00:15:25.856000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeec9a6a8 a2=94 a3=5 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.856000 audit: BPF prog-id=105 op=UNLOAD Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeec9a7b0 a2=50 a3=0 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeec9a8f8 a2=4 a3=3 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { confidentiality } for pid=2969 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:25.856000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeec9a8d8 a2=94 a3=6 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.856000 audit[2969]: AVC avc: denied { confidentiality } for pid=2969 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:25.856000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeec9a0a8 a2=94 a3=83 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { confidentiality } for pid=2969 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:15:25.857000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeec9a0a8 a2=94 a3=83 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.857000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.857000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.857000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeec9bae8 a2=10 a3=ffffeec9bbd8 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.857000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.858000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.858000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeec9b9a8 a2=10 a3=ffffeec9ba98 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.858000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.858000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeec9b918 a2=10 a3=ffffeec9ba98 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.858000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:25.858000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeec9b918 a2=10 a3=ffffeec9ba98 items=0 ppid=2842 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:15:25.865000 audit: BPF prog-id=100 op=UNLOAD Nov 1 00:15:25.964000 audit[2995]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:25.964000 audit[2995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd6f9afd0 a2=0 a3=ffff8540dfa8 items=0 ppid=2842 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.964000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:25.982000 audit[2996]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:25.982000 audit[2996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc012fec0 a2=0 a3=ffffa46a4fa8 items=0 ppid=2842 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.982000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:25.988000 audit[2998]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:25.988000 audit[2998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc2c7b6c0 a2=0 a3=ffff8f0c1fa8 items=0 ppid=2842 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.988000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:25.991000 audit[2994]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2994 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:25.991000 audit[2994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffca789ef0 a2=0 a3=ffff90e4efa8 items=0 ppid=2842 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:25.991000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:26.739058 kubelet[2211]: E1101 00:15:26.738988 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:27.613290 systemd-networkd[1548]: vxlan.calico: Gained IPv6LL Nov 1 00:15:27.739380 kubelet[2211]: E1101 00:15:27.739319 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:28.739900 kubelet[2211]: E1101 00:15:28.739836 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:29.740702 kubelet[2211]: E1101 00:15:29.740616 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:30.741655 kubelet[2211]: E1101 00:15:30.741589 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:30.971693 env[1828]: time="2025-11-01T00:15:30.971635916Z" level=info msg="StopPodSandbox for \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\"" Nov 1 00:15:30.973082 env[1828]: time="2025-11-01T00:15:30.971912495Z" level=info msg="StopPodSandbox for \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\"" Nov 1 00:15:31.093483 kubelet[2211]: I1101 00:15:31.093388 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-swtj8" podStartSLOduration=10.307931608 podStartE2EDuration="29.093365509s" podCreationTimestamp="2025-11-01 00:15:02 +0000 UTC" firstStartedPulling="2025-11-01 00:15:03.860108804 +0000 UTC m=+3.522085036" lastFinishedPulling="2025-11-01 00:15:22.645542705 +0000 UTC m=+22.307518937" observedRunningTime="2025-11-01 00:15:23.107516324 +0000 UTC m=+22.769492568" watchObservedRunningTime="2025-11-01 00:15:31.093365509 +0000 UTC m=+30.755341777" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.097 [INFO][3024] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.097 [INFO][3024] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" iface="eth0" netns="/var/run/netns/cni-b8c04efa-124b-9d55-b137-4d0e3810b02d" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.098 [INFO][3024] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" iface="eth0" netns="/var/run/netns/cni-b8c04efa-124b-9d55-b137-4d0e3810b02d" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.098 [INFO][3024] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" iface="eth0" netns="/var/run/netns/cni-b8c04efa-124b-9d55-b137-4d0e3810b02d" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.098 [INFO][3024] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.098 [INFO][3024] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.172 [INFO][3049] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.173 [INFO][3049] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.173 [INFO][3049] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.208 [WARNING][3049] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.209 [INFO][3049] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.216 [INFO][3049] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:31.224135 env[1828]: 2025-11-01 00:15:31.221 [INFO][3024] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:15:31.228580 env[1828]: time="2025-11-01T00:15:31.228517593Z" level=info msg="TearDown network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\" successfully" Nov 1 00:15:31.228790 env[1828]: time="2025-11-01T00:15:31.228749866Z" level=info msg="StopPodSandbox for \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\" returns successfully" Nov 1 00:15:31.231585 systemd[1]: run-netns-cni\x2db8c04efa\x2d124b\x2d9d55\x2db137\x2d4d0e3810b02d.mount: Deactivated successfully. Nov 1 00:15:31.236115 env[1828]: time="2025-11-01T00:15:31.236036084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcgnr,Uid:fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a,Namespace:calico-system,Attempt:1,}" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.094 [INFO][3029] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.094 [INFO][3029] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" iface="eth0" netns="/var/run/netns/cni-31c5cfa9-a3e8-5c78-c938-89688d4b63fb" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.095 [INFO][3029] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" iface="eth0" netns="/var/run/netns/cni-31c5cfa9-a3e8-5c78-c938-89688d4b63fb" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.095 [INFO][3029] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" iface="eth0" netns="/var/run/netns/cni-31c5cfa9-a3e8-5c78-c938-89688d4b63fb" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.095 [INFO][3029] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.095 [INFO][3029] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.172 [INFO][3047] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.175 [INFO][3047] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.216 [INFO][3047] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.264 [WARNING][3047] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.264 [INFO][3047] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.267 [INFO][3047] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:31.273219 env[1828]: 2025-11-01 00:15:31.270 [INFO][3029] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:15:31.277530 systemd[1]: run-netns-cni\x2d31c5cfa9\x2da3e8\x2d5c78\x2dc938\x2d89688d4b63fb.mount: Deactivated successfully. Nov 1 00:15:31.279628 env[1828]: time="2025-11-01T00:15:31.279553191Z" level=info msg="TearDown network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\" successfully" Nov 1 00:15:31.279628 env[1828]: time="2025-11-01T00:15:31.279616506Z" level=info msg="StopPodSandbox for \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\" returns successfully" Nov 1 00:15:31.282600 env[1828]: time="2025-11-01T00:15:31.282544732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-6nvvc,Uid:14967cb9-9ca0-45f1-b81d-8afa3223333a,Namespace:default,Attempt:1,}" Nov 1 00:15:31.415298 update_engine[1823]: I1101 00:15:31.415143 1823 update_attempter.cc:509] Updating boot flags... Nov 1 00:15:31.548311 systemd-networkd[1548]: cali1e5f298bd9a: Link UP Nov 1 00:15:31.551199 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:15:31.551432 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e5f298bd9a: link becomes ready Nov 1 00:15:31.552099 systemd-networkd[1548]: cali1e5f298bd9a: Gained carrier Nov 1 00:15:31.562469 kubelet[2211]: I1101 00:15:31.562314 2211 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Nov 1 00:15:31.578622 (udev-worker)[3137]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.355 [INFO][3062] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.96-k8s-csi--node--driver--tcgnr-eth0 csi-node-driver- calico-system fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a 1297 0 2025-11-01 00:15:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:9d99788f7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.29.96 csi-node-driver-tcgnr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1e5f298bd9a [] [] }} ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.355 [INFO][3062] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.424 [INFO][3087] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" HandleID="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.424 [INFO][3087] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" HandleID="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003283b0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.29.96", "pod":"csi-node-driver-tcgnr", "timestamp":"2025-11-01 00:15:31.42411443 +0000 UTC"}, Hostname:"172.31.29.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.424 [INFO][3087] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.425 [INFO][3087] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.425 [INFO][3087] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.96' Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.445 [INFO][3087] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.455 [INFO][3087] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.469 [INFO][3087] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.473 [INFO][3087] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.478 [INFO][3087] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.480 [INFO][3087] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.497 [INFO][3087] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120 Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.506 [INFO][3087] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.532 [INFO][3087] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.37.1/26] block=192.168.37.0/26 handle="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.532 [INFO][3087] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.1/26] handle="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" host="172.31.29.96" Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.533 [INFO][3087] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:31.584965 env[1828]: 2025-11-01 00:15:31.533 [INFO][3087] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.37.1/26] IPv6=[] ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" HandleID="k8s-pod-network.9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.586376 env[1828]: 2025-11-01 00:15:31.537 [INFO][3062] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-csi--node--driver--tcgnr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"", Pod:"csi-node-driver-tcgnr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e5f298bd9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:31.586376 env[1828]: 2025-11-01 00:15:31.537 [INFO][3062] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.1/32] ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.586376 env[1828]: 2025-11-01 00:15:31.538 [INFO][3062] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1e5f298bd9a ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.586376 env[1828]: 2025-11-01 00:15:31.552 [INFO][3062] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.586376 env[1828]: 2025-11-01 00:15:31.553 [INFO][3062] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-csi--node--driver--tcgnr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120", Pod:"csi-node-driver-tcgnr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e5f298bd9a", MAC:"ae:56:5d:58:67:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:31.586376 env[1828]: 2025-11-01 00:15:31.570 [INFO][3062] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120" Namespace="calico-system" Pod="csi-node-driver-tcgnr" WorkloadEndpoint="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:15:31.687512 kernel: kauditd_printk_skb: 590 callbacks suppressed Nov 1 00:15:31.687658 kernel: audit: type=1325 audit(1761956131.620:680): table=filter:73 family=2 entries=38 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:31.687721 kernel: audit: type=1300 audit(1761956131.620:680): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffd3f1f10 a2=0 a3=ffff8c508fa8 items=0 ppid=2842 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.620000 audit[3162]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:31.620000 audit[3162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffd3f1f10 a2=0 a3=ffff8c508fa8 items=0 ppid=2842 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.708288 kernel: audit: type=1327 audit(1761956131.620:680): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:31.620000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:31.738175 (udev-worker)[3179]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:31.740763 systemd-networkd[1548]: cali8c950ee76e1: Link UP Nov 1 00:15:31.742273 kubelet[2211]: E1101 00:15:31.742127 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:31.748214 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8c950ee76e1: link becomes ready Nov 1 00:15:31.747055 systemd-networkd[1548]: cali8c950ee76e1: Gained carrier Nov 1 00:15:31.762153 env[1828]: time="2025-11-01T00:15:31.761979965Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:31.764571 env[1828]: time="2025-11-01T00:15:31.764499161Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:31.764844 env[1828]: time="2025-11-01T00:15:31.764770111Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:31.765373 env[1828]: time="2025-11-01T00:15:31.765309228Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120 pid=3233 runtime=io.containerd.runc.v2 Nov 1 00:15:31.796863 systemd[1]: Started cri-containerd-9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120.scope. Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.394 [INFO][3074] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0 nginx-deployment-bb8f74bfb- default 14967cb9-9ca0-45f1-b81d-8afa3223333a 1296 0 2025-11-01 00:15:14 +0000 UTC map[app:nginx pod-template-hash:bb8f74bfb projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.29.96 nginx-deployment-bb8f74bfb-6nvvc eth0 default [] [] [kns.default ksa.default.default] cali8c950ee76e1 [] [] }} ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.395 [INFO][3074] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.509 [INFO][3095] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" HandleID="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.513 [INFO][3095] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" HandleID="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003233a0), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.96", "pod":"nginx-deployment-bb8f74bfb-6nvvc", "timestamp":"2025-11-01 00:15:31.509139341 +0000 UTC"}, Hostname:"172.31.29.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.513 [INFO][3095] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.533 [INFO][3095] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.533 [INFO][3095] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.96' Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.554 [INFO][3095] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.603 [INFO][3095] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.615 [INFO][3095] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.638 [INFO][3095] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.648 [INFO][3095] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.649 [INFO][3095] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.658 [INFO][3095] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7 Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.692 [INFO][3095] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.717 [INFO][3095] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.37.2/26] block=192.168.37.0/26 handle="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.717 [INFO][3095] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.2/26] handle="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" host="172.31.29.96" Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.717 [INFO][3095] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:31.833704 env[1828]: 2025-11-01 00:15:31.717 [INFO][3095] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.37.2/26] IPv6=[] ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" HandleID="k8s-pod-network.c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.834947 env[1828]: 2025-11-01 00:15:31.731 [INFO][3074] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"14967cb9-9ca0-45f1-b81d-8afa3223333a", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"", Pod:"nginx-deployment-bb8f74bfb-6nvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c950ee76e1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:31.834947 env[1828]: 2025-11-01 00:15:31.731 [INFO][3074] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.2/32] ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.834947 env[1828]: 2025-11-01 00:15:31.731 [INFO][3074] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8c950ee76e1 ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.834947 env[1828]: 2025-11-01 00:15:31.757 [INFO][3074] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.834947 env[1828]: 2025-11-01 00:15:31.758 [INFO][3074] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"14967cb9-9ca0-45f1-b81d-8afa3223333a", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7", Pod:"nginx-deployment-bb8f74bfb-6nvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c950ee76e1", MAC:"ba:63:f3:d2:f6:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:31.834947 env[1828]: 2025-11-01 00:15:31.772 [INFO][3074] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7" Namespace="default" Pod="nginx-deployment-bb8f74bfb-6nvvc" WorkloadEndpoint="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:15:31.922747 env[1828]: time="2025-11-01T00:15:31.919788604Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:31.922747 env[1828]: time="2025-11-01T00:15:31.919853719Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:31.922747 env[1828]: time="2025-11-01T00:15:31.919889337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:31.922747 env[1828]: time="2025-11-01T00:15:31.921251817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7 pid=3281 runtime=io.containerd.runc.v2 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.947076 kernel: audit: type=1400 audit(1761956131.925:681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.947212 kernel: audit: type=1400 audit(1761956131.925:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.977682 kernel: audit: type=1400 audit(1761956131.925:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.986763 kernel: audit: type=1400 audit(1761956131.925:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.999452 kernel: audit: type=1400 audit(1761956131.925:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.008377 kernel: audit: type=1400 audit(1761956131.925:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.017479 kernel: audit: type=1400 audit(1761956131.925:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.934000 audit: BPF prog-id=106 op=LOAD Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3233 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937323765633764656133323334373236326132636236346437376634 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3233 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937323765633764656133323334373236326132636236346437376634 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit: BPF prog-id=107 op=LOAD Nov 1 00:15:31.961000 audit[3247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3233 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937323765633764656133323334373236326132636236346437376634 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit: BPF prog-id=108 op=LOAD Nov 1 00:15:31.961000 audit[3247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3233 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937323765633764656133323334373236326132636236346437376634 Nov 1 00:15:31.961000 audit: BPF prog-id=108 op=UNLOAD Nov 1 00:15:31.961000 audit: BPF prog-id=107 op=UNLOAD Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:31.961000 audit: BPF prog-id=109 op=LOAD Nov 1 00:15:31.961000 audit[3247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3233 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937323765633764656133323334373236326132636236346437376634 Nov 1 00:15:31.966000 audit[3297]: NETFILTER_CFG table=filter:74 family=2 entries=42 op=nft_register_chain pid=3297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:31.966000 audit[3297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffe4dda390 a2=0 a3=ffffbe24dfa8 items=0 ppid=2842 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:31.966000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:32.070981 systemd[1]: Started cri-containerd-c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7.scope. Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.141000 audit: BPF prog-id=110 op=LOAD Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3281 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:32.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393036623335366362326461316437643936386266363263623330 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3281 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:32.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393036623335366362326461316437643936386266363263623330 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.142000 audit: BPF prog-id=111 op=LOAD Nov 1 00:15:32.142000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3281 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:32.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393036623335366362326461316437643936386266363263623330 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit: BPF prog-id=112 op=LOAD Nov 1 00:15:32.143000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3281 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:32.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393036623335366362326461316437643936386266363263623330 Nov 1 00:15:32.143000 audit: BPF prog-id=112 op=UNLOAD Nov 1 00:15:32.143000 audit: BPF prog-id=111 op=UNLOAD Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:32.143000 audit: BPF prog-id=113 op=LOAD Nov 1 00:15:32.143000 audit[3295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3281 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:32.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393036623335366362326461316437643936386266363263623330 Nov 1 00:15:32.165202 env[1828]: time="2025-11-01T00:15:32.165137481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcgnr,Uid:fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a,Namespace:calico-system,Attempt:1,} returns sandbox id \"9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120\"" Nov 1 00:15:32.171981 env[1828]: time="2025-11-01T00:15:32.171926316Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:15:32.236121 env[1828]: time="2025-11-01T00:15:32.235901440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-6nvvc,Uid:14967cb9-9ca0-45f1-b81d-8afa3223333a,Namespace:default,Attempt:1,} returns sandbox id \"c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7\"" Nov 1 00:15:32.430888 env[1828]: time="2025-11-01T00:15:32.430794596Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:32.431959 env[1828]: time="2025-11-01T00:15:32.431872322Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:15:32.432289 kubelet[2211]: E1101 00:15:32.432239 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:32.432395 kubelet[2211]: E1101 00:15:32.432307 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:32.432587 kubelet[2211]: E1101 00:15:32.432548 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:32.434867 env[1828]: time="2025-11-01T00:15:32.434803576Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:15:32.742890 kubelet[2211]: E1101 00:15:32.742765 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:32.797273 systemd-networkd[1548]: cali8c950ee76e1: Gained IPv6LL Nov 1 00:15:32.990280 systemd-networkd[1548]: cali1e5f298bd9a: Gained IPv6LL Nov 1 00:15:33.744234 kubelet[2211]: E1101 00:15:33.744167 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:34.744664 kubelet[2211]: E1101 00:15:34.744595 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:35.744803 kubelet[2211]: E1101 00:15:35.744730 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:35.773599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2855823155.mount: Deactivated successfully. Nov 1 00:15:36.745972 kubelet[2211]: E1101 00:15:36.745905 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:37.686462 amazon-ssm-agent[1805]: 2025-11-01 00:15:37 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Nov 1 00:15:37.746439 kubelet[2211]: E1101 00:15:37.746368 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:38.009113 env[1828]: time="2025-11-01T00:15:38.008945376Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:38.011607 env[1828]: time="2025-11-01T00:15:38.011540305Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:38.014901 env[1828]: time="2025-11-01T00:15:38.014847918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:38.018262 env[1828]: time="2025-11-01T00:15:38.018198299Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:38.020007 env[1828]: time="2025-11-01T00:15:38.019960325Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Nov 1 00:15:38.023246 env[1828]: time="2025-11-01T00:15:38.023164854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:15:38.026602 env[1828]: time="2025-11-01T00:15:38.026538372Z" level=info msg="CreateContainer within sandbox \"c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Nov 1 00:15:38.045985 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4059186176.mount: Deactivated successfully. Nov 1 00:15:38.056220 env[1828]: time="2025-11-01T00:15:38.056138299Z" level=info msg="CreateContainer within sandbox \"c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"18b0bbc74e611d24b4005892c32940d19b9258cd5c443967f3cbc650e697d50a\"" Nov 1 00:15:38.057622 env[1828]: time="2025-11-01T00:15:38.057560184Z" level=info msg="StartContainer for \"18b0bbc74e611d24b4005892c32940d19b9258cd5c443967f3cbc650e697d50a\"" Nov 1 00:15:38.113245 systemd[1]: Started cri-containerd-18b0bbc74e611d24b4005892c32940d19b9258cd5c443967f3cbc650e697d50a.scope. Nov 1 00:15:38.153306 kernel: kauditd_printk_skb: 110 callbacks suppressed Nov 1 00:15:38.153461 kernel: audit: type=1400 audit(1761956138.149:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168400 kernel: audit: type=1400 audit(1761956138.149:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168477 kernel: audit: type=1400 audit(1761956138.149:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.184013 kernel: audit: type=1400 audit(1761956138.149:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.193332 kernel: audit: type=1400 audit(1761956138.149:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.202224 kernel: audit: type=1400 audit(1761956138.149:723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.210357 kernel: audit: type=1400 audit(1761956138.149:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.218560 kernel: audit: type=1400 audit(1761956138.149:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.227553 kernel: audit: type=1400 audit(1761956138.149:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.231182 env[1828]: time="2025-11-01T00:15:38.231125144Z" level=info msg="StartContainer for \"18b0bbc74e611d24b4005892c32940d19b9258cd5c443967f3cbc650e697d50a\" returns successfully" Nov 1 00:15:38.237973 kernel: audit: type=1400 audit(1761956138.152:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit: BPF prog-id=114 op=LOAD Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3281 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:38.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623062626337346536313164323462343030353839326333323934 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3281 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:38.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623062626337346536313164323462343030353839326333323934 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.152000 audit: BPF prog-id=115 op=LOAD Nov 1 00:15:38.152000 audit[3370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3281 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:38.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623062626337346536313164323462343030353839326333323934 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.160000 audit: BPF prog-id=116 op=LOAD Nov 1 00:15:38.160000 audit[3370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3281 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:38.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623062626337346536313164323462343030353839326333323934 Nov 1 00:15:38.168000 audit: BPF prog-id=116 op=UNLOAD Nov 1 00:15:38.168000 audit: BPF prog-id=115 op=UNLOAD Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:38.168000 audit: BPF prog-id=117 op=LOAD Nov 1 00:15:38.168000 audit[3370]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3281 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:38.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623062626337346536313164323462343030353839326333323934 Nov 1 00:15:38.312525 env[1828]: time="2025-11-01T00:15:38.312368948Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:38.314076 env[1828]: time="2025-11-01T00:15:38.313988012Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:15:38.315444 kubelet[2211]: E1101 00:15:38.314576 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:38.315444 kubelet[2211]: E1101 00:15:38.314658 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:38.315444 kubelet[2211]: E1101 00:15:38.314792 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:38.315779 kubelet[2211]: E1101 00:15:38.314886 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:38.747427 kubelet[2211]: E1101 00:15:38.747370 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:39.039180 systemd[1]: run-containerd-runc-k8s.io-18b0bbc74e611d24b4005892c32940d19b9258cd5c443967f3cbc650e697d50a-runc.6lluEx.mount: Deactivated successfully. Nov 1 00:15:39.123530 kubelet[2211]: E1101 00:15:39.123465 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:39.172264 kubelet[2211]: I1101 00:15:39.172180 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-bb8f74bfb-6nvvc" podStartSLOduration=19.391915335 podStartE2EDuration="25.172157975s" podCreationTimestamp="2025-11-01 00:15:14 +0000 UTC" firstStartedPulling="2025-11-01 00:15:32.242195118 +0000 UTC m=+31.904171350" lastFinishedPulling="2025-11-01 00:15:38.022437698 +0000 UTC m=+37.684413990" observedRunningTime="2025-11-01 00:15:39.138278347 +0000 UTC m=+38.800254627" watchObservedRunningTime="2025-11-01 00:15:39.172157975 +0000 UTC m=+38.834134207" Nov 1 00:15:39.748599 kubelet[2211]: E1101 00:15:39.748528 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:40.749352 kubelet[2211]: E1101 00:15:40.749281 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:41.717610 kubelet[2211]: E1101 00:15:41.717549 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:41.750471 kubelet[2211]: E1101 00:15:41.750423 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:42.751570 kubelet[2211]: E1101 00:15:42.751501 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:43.752095 kubelet[2211]: E1101 00:15:43.752038 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:44.753151 kubelet[2211]: E1101 00:15:44.753110 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:45.754522 kubelet[2211]: E1101 00:15:45.754476 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:46.121116 kernel: kauditd_printk_skb: 47 callbacks suppressed Nov 1 00:15:46.121239 kernel: audit: type=1325 audit(1761956146.117:736): table=filter:75 family=2 entries=26 op=nft_register_rule pid=3427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:46.117000 audit[3427]: NETFILTER_CFG table=filter:75 family=2 entries=26 op=nft_register_rule pid=3427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:46.117000 audit[3427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffe89c74c0 a2=0 a3=1 items=0 ppid=2441 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:46.139622 kernel: audit: type=1300 audit(1761956146.117:736): arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffe89c74c0 a2=0 a3=1 items=0 ppid=2441 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:46.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:46.145542 kernel: audit: type=1327 audit(1761956146.117:736): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:46.145674 kernel: audit: type=1325 audit(1761956146.141:737): table=nat:76 family=2 entries=20 op=nft_register_rule pid=3427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:46.141000 audit[3427]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=3427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:46.141000 audit[3427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe89c74c0 a2=0 a3=1 items=0 ppid=2441 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:46.163773 kernel: audit: type=1300 audit(1761956146.141:737): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe89c74c0 a2=0 a3=1 items=0 ppid=2441 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:46.163853 kernel: audit: type=1327 audit(1761956146.141:737): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:46.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:46.255945 systemd[1]: Created slice kubepods-besteffort-pod37eef70b_347d_4f5a_8c39_55c07e5a2cf2.slice. Nov 1 00:15:46.325093 kubelet[2211]: I1101 00:15:46.325016 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/37eef70b-347d-4f5a-8c39-55c07e5a2cf2-data\") pod \"nfs-server-provisioner-0\" (UID: \"37eef70b-347d-4f5a-8c39-55c07e5a2cf2\") " pod="default/nfs-server-provisioner-0" Nov 1 00:15:46.325286 kubelet[2211]: I1101 00:15:46.325207 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fm5lk\" (UniqueName: \"kubernetes.io/projected/37eef70b-347d-4f5a-8c39-55c07e5a2cf2-kube-api-access-fm5lk\") pod \"nfs-server-provisioner-0\" (UID: \"37eef70b-347d-4f5a-8c39-55c07e5a2cf2\") " pod="default/nfs-server-provisioner-0" Nov 1 00:15:46.567211 env[1828]: time="2025-11-01T00:15:46.566615569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:37eef70b-347d-4f5a-8c39-55c07e5a2cf2,Namespace:default,Attempt:0,}" Nov 1 00:15:46.755637 kubelet[2211]: E1101 00:15:46.755542 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:46.871627 systemd-networkd[1548]: cali60e51b789ff: Link UP Nov 1 00:15:46.878169 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:15:46.878897 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Nov 1 00:15:46.878840 systemd-networkd[1548]: cali60e51b789ff: Gained carrier Nov 1 00:15:46.880389 (udev-worker)[3450]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.667 [INFO][3429] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.96-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 37eef70b-347d-4f5a-8c39-55c07e5a2cf2 1407 0 2025-11-01 00:15:46 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-7c9b4c458c heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.29.96 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.668 [INFO][3429] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.721 [INFO][3442] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" HandleID="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Workload="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.722 [INFO][3442] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" HandleID="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Workload="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2040), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.96", "pod":"nfs-server-provisioner-0", "timestamp":"2025-11-01 00:15:46.721961657 +0000 UTC"}, Hostname:"172.31.29.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.722 [INFO][3442] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.722 [INFO][3442] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.722 [INFO][3442] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.96' Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.787 [INFO][3442] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.801 [INFO][3442] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.816 [INFO][3442] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.821 [INFO][3442] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.830 [INFO][3442] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.830 [INFO][3442] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.833 [INFO][3442] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1 Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.844 [INFO][3442] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.863 [INFO][3442] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.37.3/26] block=192.168.37.0/26 handle="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.864 [INFO][3442] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.3/26] handle="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" host="172.31.29.96" Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.864 [INFO][3442] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:15:46.903979 env[1828]: 2025-11-01 00:15:46.864 [INFO][3442] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.37.3/26] IPv6=[] ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" HandleID="k8s-pod-network.412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Workload="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:46.905391 env[1828]: 2025-11-01 00:15:46.867 [INFO][3429] cni-plugin/k8s.go 418: Populated endpoint ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"37eef70b-347d-4f5a-8c39-55c07e5a2cf2", ResourceVersion:"1407", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:46.905391 env[1828]: 2025-11-01 00:15:46.867 [INFO][3429] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.3/32] ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:46.905391 env[1828]: 2025-11-01 00:15:46.867 [INFO][3429] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:46.905391 env[1828]: 2025-11-01 00:15:46.879 [INFO][3429] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:46.905762 env[1828]: 2025-11-01 00:15:46.881 [INFO][3429] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"37eef70b-347d-4f5a-8c39-55c07e5a2cf2", ResourceVersion:"1407", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"72:37:79:45:f6:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:15:46.905762 env[1828]: 2025-11-01 00:15:46.901 [INFO][3429] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.96-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:15:46.923406 env[1828]: time="2025-11-01T00:15:46.923295275Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:15:46.923709 env[1828]: time="2025-11-01T00:15:46.923649080Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:15:46.923888 env[1828]: time="2025-11-01T00:15:46.923831977Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:15:46.924404 env[1828]: time="2025-11-01T00:15:46.924326006Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1 pid=3465 runtime=io.containerd.runc.v2 Nov 1 00:15:46.957793 systemd[1]: Started cri-containerd-412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1.scope. Nov 1 00:15:46.985000 audit[3486]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=3486 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:46.985000 audit[3486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffeacc1e80 a2=0 a3=ffff8979cfa8 items=0 ppid=2842 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.006177 kernel: audit: type=1325 audit(1761956146.985:738): table=filter:77 family=2 entries=40 op=nft_register_chain pid=3486 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:15:47.006296 kernel: audit: type=1300 audit(1761956146.985:738): arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffeacc1e80 a2=0 a3=ffff8979cfa8 items=0 ppid=2842 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.006537 kernel: audit: type=1327 audit(1761956146.985:738): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:46.985000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.029232 kernel: audit: type=1400 audit(1761956147.017:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.018000 audit: BPF prog-id=118 op=LOAD Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3465 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326231373165646230383534366139393132343563636437366563 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3465 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326231373165646230383534366139393132343563636437366563 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit: BPF prog-id=119 op=LOAD Nov 1 00:15:47.019000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3465 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326231373165646230383534366139393132343563636437366563 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit: BPF prog-id=120 op=LOAD Nov 1 00:15:47.019000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3465 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326231373165646230383534366139393132343563636437366563 Nov 1 00:15:47.019000 audit: BPF prog-id=120 op=UNLOAD Nov 1 00:15:47.019000 audit: BPF prog-id=119 op=UNLOAD Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:47.019000 audit: BPF prog-id=121 op=LOAD Nov 1 00:15:47.019000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3465 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431326231373165646230383534366139393132343563636437366563 Nov 1 00:15:47.067914 env[1828]: time="2025-11-01T00:15:47.067839270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:37eef70b-347d-4f5a-8c39-55c07e5a2cf2,Namespace:default,Attempt:0,} returns sandbox id \"412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1\"" Nov 1 00:15:47.070940 env[1828]: time="2025-11-01T00:15:47.070881757Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Nov 1 00:15:47.180000 audit[3502]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_rule pid=3502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:47.180000 audit[3502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffdad1d2f0 a2=0 a3=1 items=0 ppid=2441 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:47.187000 audit[3502]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=3502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:47.187000 audit[3502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdad1d2f0 a2=0 a3=1 items=0 ppid=2441 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:47.187000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:47.756503 kubelet[2211]: E1101 00:15:47.756367 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:47.965482 systemd-networkd[1548]: cali60e51b789ff: Gained IPv6LL Nov 1 00:15:48.757495 kubelet[2211]: E1101 00:15:48.757430 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:49.758582 kubelet[2211]: E1101 00:15:49.758490 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:50.284378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount276122144.mount: Deactivated successfully. Nov 1 00:15:50.758843 kubelet[2211]: E1101 00:15:50.758787 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:51.759305 kubelet[2211]: E1101 00:15:51.759233 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:52.760182 kubelet[2211]: E1101 00:15:52.760119 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:53.760954 kubelet[2211]: E1101 00:15:53.760883 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:53.817033 env[1828]: time="2025-11-01T00:15:53.816973713Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:53.821463 env[1828]: time="2025-11-01T00:15:53.821411731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:53.825189 env[1828]: time="2025-11-01T00:15:53.825121777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:53.829283 env[1828]: time="2025-11-01T00:15:53.829217584Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:15:53.830973 env[1828]: time="2025-11-01T00:15:53.830893144Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Nov 1 00:15:53.835470 env[1828]: time="2025-11-01T00:15:53.835421224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:15:53.840983 env[1828]: time="2025-11-01T00:15:53.840902976Z" level=info msg="CreateContainer within sandbox \"412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Nov 1 00:15:53.869515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2480121394.mount: Deactivated successfully. Nov 1 00:15:53.883950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3538259952.mount: Deactivated successfully. Nov 1 00:15:53.889910 env[1828]: time="2025-11-01T00:15:53.889827809Z" level=info msg="CreateContainer within sandbox \"412b171edb08546a991245ccd76ecaf612d3ead1c80cfd3fda11afa5e9ea31c1\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5b729455dc42bd5c1ff4c4f87fce3f7083a94a7ac0c30fe7acb503b7f83fa13d\"" Nov 1 00:15:53.891248 env[1828]: time="2025-11-01T00:15:53.891198826Z" level=info msg="StartContainer for \"5b729455dc42bd5c1ff4c4f87fce3f7083a94a7ac0c30fe7acb503b7f83fa13d\"" Nov 1 00:15:53.929892 systemd[1]: Started cri-containerd-5b729455dc42bd5c1ff4c4f87fce3f7083a94a7ac0c30fe7acb503b7f83fa13d.scope. Nov 1 00:15:53.973108 kernel: kauditd_printk_skb: 62 callbacks suppressed Nov 1 00:15:53.973259 kernel: audit: type=1400 audit(1761956153.971:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990729 kernel: audit: type=1400 audit(1761956153.979:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990846 kernel: audit: type=1400 audit(1761956153.979:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:54.006204 kernel: audit: type=1400 audit(1761956153.979:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:54.014727 kernel: audit: type=1400 audit(1761956153.979:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:54.023186 kernel: audit: type=1400 audit(1761956153.979:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:54.031708 kernel: audit: type=1400 audit(1761956153.979:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:54.048681 kernel: audit: type=1400 audit(1761956153.979:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:54.048825 kernel: audit: type=1400 audit(1761956153.979:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:54.056854 kernel: audit: type=1400 audit(1761956153.981:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.981000 audit: BPF prog-id=122 op=LOAD Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3465 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:53.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562373239343535646334326264356331666634633466383766636533 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3465 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:53.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562373239343535646334326264356331666634633466383766636533 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.982000 audit: BPF prog-id=123 op=LOAD Nov 1 00:15:53.982000 audit[3512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3465 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:53.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562373239343535646334326264356331666634633466383766636533 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.990000 audit: BPF prog-id=124 op=LOAD Nov 1 00:15:53.990000 audit[3512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3465 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:53.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562373239343535646334326264356331666634633466383766636533 Nov 1 00:15:53.997000 audit: BPF prog-id=124 op=UNLOAD Nov 1 00:15:53.997000 audit: BPF prog-id=123 op=UNLOAD Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:15:53.997000 audit: BPF prog-id=125 op=LOAD Nov 1 00:15:53.997000 audit[3512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3465 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:53.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562373239343535646334326264356331666634633466383766636533 Nov 1 00:15:54.074222 env[1828]: time="2025-11-01T00:15:54.074132184Z" level=info msg="StartContainer for \"5b729455dc42bd5c1ff4c4f87fce3f7083a94a7ac0c30fe7acb503b7f83fa13d\" returns successfully" Nov 1 00:15:54.114465 env[1828]: time="2025-11-01T00:15:54.114384780Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:54.116772 env[1828]: time="2025-11-01T00:15:54.116684579Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:15:54.117114 kubelet[2211]: E1101 00:15:54.117017 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:54.117236 kubelet[2211]: E1101 00:15:54.117106 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:15:54.117323 kubelet[2211]: E1101 00:15:54.117225 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:54.119139 env[1828]: time="2025-11-01T00:15:54.119045448Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:15:54.205000 audit[3540]: AVC avc: denied { search } for pid=3540 comm="rpcbind" name="crypto" dev="proc" ino=18490 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:54.205000 audit[3540]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9715f000 a2=0 a3=0 items=0 ppid=3523 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 key=(null) Nov 1 00:15:54.205000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Nov 1 00:15:54.288000 audit[3546]: NETFILTER_CFG table=filter:80 family=2 entries=26 op=nft_register_rule pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:54.288000 audit[3546]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd5ddc3c0 a2=0 a3=1 items=0 ppid=2441 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:54.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:54.295000 audit[3547]: AVC avc: denied { search } for pid=3547 comm="dbus-daemon" name="crypto" dev="proc" ino=18490 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:54.295000 audit[3547]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffae4ff000 a2=0 a3=0 items=0 ppid=3523 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 key=(null) Nov 1 00:15:54.295000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:15:54.302000 audit[3546]: NETFILTER_CFG table=nat:81 family=2 entries=104 op=nft_register_chain pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:15:54.304000 audit[3548]: AVC avc: denied { watch } for pid=3548 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c353,c666 tclass=dir permissive=0 Nov 1 00:15:54.304000 audit[3548]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaacd6c7fb0 a2=2c8 a3=aaaacd6ada60 items=0 ppid=3523 pid=3548 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 key=(null) Nov 1 00:15:54.304000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:15:54.302000 audit[3546]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffd5ddc3c0 a2=0 a3=1 items=0 ppid=2441 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:15:54.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:15:54.315000 audit[3549]: AVC avc: denied { read } for pid=3549 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18575 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Nov 1 00:15:54.315000 audit[3549]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb570a570 a2=80000 a3=0 items=0 ppid=3523 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 key=(null) Nov 1 00:15:54.315000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:15:54.317000 audit[3549]: AVC avc: denied { search } for pid=3549 comm="ganesha.nfsd" name="crypto" dev="proc" ino=18490 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:15:54.317000 audit[3549]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb4a9f000 a2=0 a3=0 items=0 ppid=3523 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c666 key=(null) Nov 1 00:15:54.317000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:15:54.360969 env[1828]: time="2025-11-01T00:15:54.360860804Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:15:54.363341 env[1828]: time="2025-11-01T00:15:54.363241149Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:15:54.363680 kubelet[2211]: E1101 00:15:54.363585 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:54.364520 kubelet[2211]: E1101 00:15:54.363677 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:15:54.364520 kubelet[2211]: E1101 00:15:54.363808 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:15:54.364520 kubelet[2211]: E1101 00:15:54.363876 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:15:54.761802 kubelet[2211]: E1101 00:15:54.761756 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:55.762083 kubelet[2211]: E1101 00:15:55.762010 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:56.762335 kubelet[2211]: E1101 00:15:56.762270 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:57.763455 kubelet[2211]: E1101 00:15:57.763414 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:58.764687 kubelet[2211]: E1101 00:15:58.764618 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:15:59.765866 kubelet[2211]: E1101 00:15:59.765798 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:00.766807 kubelet[2211]: E1101 00:16:00.766732 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:01.717558 kubelet[2211]: E1101 00:16:01.717490 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:01.755232 env[1828]: time="2025-11-01T00:16:01.754684219Z" level=info msg="StopPodSandbox for \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\"" Nov 1 00:16:01.767738 kubelet[2211]: E1101 00:16:01.767674 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.836 [WARNING][3564] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-csi--node--driver--tcgnr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a", ResourceVersion:"1446", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120", Pod:"csi-node-driver-tcgnr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e5f298bd9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.837 [INFO][3564] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.837 [INFO][3564] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" iface="eth0" netns="" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.837 [INFO][3564] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.837 [INFO][3564] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.879 [INFO][3571] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.880 [INFO][3571] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.880 [INFO][3571] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.893 [WARNING][3571] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.893 [INFO][3571] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.895 [INFO][3571] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:16:01.900555 env[1828]: 2025-11-01 00:16:01.897 [INFO][3564] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:01.901496 env[1828]: time="2025-11-01T00:16:01.901167111Z" level=info msg="TearDown network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\" successfully" Nov 1 00:16:01.901496 env[1828]: time="2025-11-01T00:16:01.901215916Z" level=info msg="StopPodSandbox for \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\" returns successfully" Nov 1 00:16:01.902439 env[1828]: time="2025-11-01T00:16:01.902388180Z" level=info msg="RemovePodSandbox for \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\"" Nov 1 00:16:01.902584 env[1828]: time="2025-11-01T00:16:01.902446321Z" level=info msg="Forcibly stopping sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\"" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:01.989 [WARNING][3586] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-csi--node--driver--tcgnr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a", ResourceVersion:"1446", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"9727ec7dea32347262a2cb64d77f4a495b04c9516299aadd81f03d28d86f6120", Pod:"csi-node-driver-tcgnr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e5f298bd9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:01.990 [INFO][3586] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:01.990 [INFO][3586] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" iface="eth0" netns="" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:01.990 [INFO][3586] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:01.990 [INFO][3586] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:02.026 [INFO][3595] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:02.027 [INFO][3595] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:02.027 [INFO][3595] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:02.047 [WARNING][3595] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:02.047 [INFO][3595] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" HandleID="k8s-pod-network.58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Workload="172.31.29.96-k8s-csi--node--driver--tcgnr-eth0" Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:02.062 [INFO][3595] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:16:02.067980 env[1828]: 2025-11-01 00:16:02.065 [INFO][3586] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc" Nov 1 00:16:02.067980 env[1828]: time="2025-11-01T00:16:02.067829188Z" level=info msg="TearDown network for sandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\" successfully" Nov 1 00:16:02.075647 env[1828]: time="2025-11-01T00:16:02.075591051Z" level=info msg="RemovePodSandbox \"58bb12d2b04c798a6dc600248aff50068f51a3380756a742337f35b82d5bdbcc\" returns successfully" Nov 1 00:16:02.076766 env[1828]: time="2025-11-01T00:16:02.076721422Z" level=info msg="StopPodSandbox for \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\"" Nov 1 00:16:02.154491 systemd[1]: run-containerd-runc-k8s.io-f82f63a26cd353998f3aee92e0c5e302cbc6207728d03b66e9b8c2f59f6078d6-runc.XLKvdc.mount: Deactivated successfully. Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.179 [WARNING][3609] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"14967cb9-9ca0-45f1-b81d-8afa3223333a", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7", Pod:"nginx-deployment-bb8f74bfb-6nvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c950ee76e1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.179 [INFO][3609] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.179 [INFO][3609] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" iface="eth0" netns="" Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.180 [INFO][3609] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.180 [INFO][3609] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.233 [INFO][3632] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.234 [INFO][3632] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.234 [INFO][3632] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.251 [WARNING][3632] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.251 [INFO][3632] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.254 [INFO][3632] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:16:02.260036 env[1828]: 2025-11-01 00:16:02.257 [INFO][3609] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.261312 env[1828]: time="2025-11-01T00:16:02.261257174Z" level=info msg="TearDown network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\" successfully" Nov 1 00:16:02.261464 env[1828]: time="2025-11-01T00:16:02.261430937Z" level=info msg="StopPodSandbox for \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\" returns successfully" Nov 1 00:16:02.262308 env[1828]: time="2025-11-01T00:16:02.262261783Z" level=info msg="RemovePodSandbox for \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\"" Nov 1 00:16:02.262679 env[1828]: time="2025-11-01T00:16:02.262588296Z" level=info msg="Forcibly stopping sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\"" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.370 [WARNING][3654] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"14967cb9-9ca0-45f1-b81d-8afa3223333a", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"c7906b356cb2da1d7d968bf62cb30f223bdc271c5b9d68ca92270ddd232c50c7", Pod:"nginx-deployment-bb8f74bfb-6nvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c950ee76e1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.371 [INFO][3654] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.371 [INFO][3654] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" iface="eth0" netns="" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.371 [INFO][3654] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.371 [INFO][3654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.408 [INFO][3661] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.408 [INFO][3661] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.408 [INFO][3661] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.422 [WARNING][3661] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.422 [INFO][3661] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" HandleID="k8s-pod-network.2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Workload="172.31.29.96-k8s-nginx--deployment--bb8f74bfb--6nvvc-eth0" Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.425 [INFO][3661] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:16:02.429845 env[1828]: 2025-11-01 00:16:02.427 [INFO][3654] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48" Nov 1 00:16:02.430798 env[1828]: time="2025-11-01T00:16:02.429891387Z" level=info msg="TearDown network for sandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\" successfully" Nov 1 00:16:02.436379 env[1828]: time="2025-11-01T00:16:02.436309095Z" level=info msg="RemovePodSandbox \"2187845d6d05aa79de6fd622a7e8d123ba6cbfa567b8661f878e54d82d430d48\" returns successfully" Nov 1 00:16:02.768753 kubelet[2211]: E1101 00:16:02.768612 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:03.769833 kubelet[2211]: E1101 00:16:03.769735 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:04.770197 kubelet[2211]: E1101 00:16:04.770128 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:05.770994 kubelet[2211]: E1101 00:16:05.770952 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:06.772426 kubelet[2211]: E1101 00:16:06.772356 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:07.773558 kubelet[2211]: E1101 00:16:07.773516 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:07.974246 kubelet[2211]: E1101 00:16:07.974170 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:16:07.996560 kubelet[2211]: I1101 00:16:07.996486 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=15.232553856 podStartE2EDuration="21.996466362s" podCreationTimestamp="2025-11-01 00:15:46 +0000 UTC" firstStartedPulling="2025-11-01 00:15:47.07000397 +0000 UTC m=+46.731980214" lastFinishedPulling="2025-11-01 00:15:53.833916488 +0000 UTC m=+53.495892720" observedRunningTime="2025-11-01 00:15:54.231262781 +0000 UTC m=+53.893239049" watchObservedRunningTime="2025-11-01 00:16:07.996466362 +0000 UTC m=+67.658442594" Nov 1 00:16:08.774318 kubelet[2211]: E1101 00:16:08.774249 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:09.774434 kubelet[2211]: E1101 00:16:09.774393 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:10.775861 kubelet[2211]: E1101 00:16:10.775783 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:11.776541 kubelet[2211]: E1101 00:16:11.776466 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:12.776874 kubelet[2211]: E1101 00:16:12.776805 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:13.777753 kubelet[2211]: E1101 00:16:13.777713 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:14.534789 systemd[1]: Created slice kubepods-besteffort-podd0334721_993c_40e8_890e_f61b2fdbec0f.slice. Nov 1 00:16:14.602163 kubelet[2211]: I1101 00:16:14.602100 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-8f9230bd-825b-410d-9307-449f86c7adea\" (UniqueName: \"kubernetes.io/nfs/d0334721-993c-40e8-890e-f61b2fdbec0f-pvc-8f9230bd-825b-410d-9307-449f86c7adea\") pod \"test-pod-1\" (UID: \"d0334721-993c-40e8-890e-f61b2fdbec0f\") " pod="default/test-pod-1" Nov 1 00:16:14.602346 kubelet[2211]: I1101 00:16:14.602170 2211 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-565j7\" (UniqueName: \"kubernetes.io/projected/d0334721-993c-40e8-890e-f61b2fdbec0f-kube-api-access-565j7\") pod \"test-pod-1\" (UID: \"d0334721-993c-40e8-890e-f61b2fdbec0f\") " pod="default/test-pod-1" Nov 1 00:16:14.721000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.726758 kernel: kauditd_printk_skb: 68 callbacks suppressed Nov 1 00:16:14.726850 kernel: audit: type=1400 audit(1761956174.721:784): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.744780 kernel: Failed to create system directory netfs Nov 1 00:16:14.744908 kernel: Failed to create system directory netfs Nov 1 00:16:14.721000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.755470 kernel: audit: type=1400 audit(1761956174.721:784): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.755547 kernel: Failed to create system directory netfs Nov 1 00:16:14.755595 kernel: audit: type=1400 audit(1761956174.721:784): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.721000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.765950 kernel: Failed to create system directory netfs Nov 1 00:16:14.766004 kernel: audit: type=1400 audit(1761956174.721:784): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.721000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.721000 audit[3693]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab138cc5e0 a1=12c14 a2=aaaad7b0e028 a3=aaab138bd010 items=0 ppid=1192 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:14.779424 kubelet[2211]: E1101 00:16:14.779371 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:14.788245 kernel: audit: type=1300 audit(1761956174.721:784): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab138cc5e0 a1=12c14 a2=aaaad7b0e028 a3=aaab138bd010 items=0 ppid=1192 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:14.788422 kernel: audit: type=1327 audit(1761956174.721:784): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:14.721000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.808687 kernel: Failed to create system directory fscache Nov 1 00:16:14.808766 kernel: audit: type=1400 audit(1761956174.780:785): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.808823 kernel: Failed to create system directory fscache Nov 1 00:16:14.808868 kernel: audit: type=1400 audit(1761956174.780:785): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.819254 kernel: Failed to create system directory fscache Nov 1 00:16:14.819337 kernel: audit: type=1400 audit(1761956174.780:785): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.829906 kernel: Failed to create system directory fscache Nov 1 00:16:14.829988 kernel: audit: type=1400 audit(1761956174.780:785): avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.838752 kernel: Failed to create system directory fscache Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.842518 kernel: Failed to create system directory fscache Nov 1 00:16:14.842642 kernel: Failed to create system directory fscache Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.846460 kernel: Failed to create system directory fscache Nov 1 00:16:14.846533 kernel: Failed to create system directory fscache Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.850351 kernel: Failed to create system directory fscache Nov 1 00:16:14.850438 kernel: Failed to create system directory fscache Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.854319 kernel: Failed to create system directory fscache Nov 1 00:16:14.854387 kernel: Failed to create system directory fscache Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.780000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.858100 kernel: Failed to create system directory fscache Nov 1 00:16:14.859667 kernel: FS-Cache: Loaded Nov 1 00:16:14.780000 audit[3693]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab13adf210 a1=4c344 a2=aaaad7b0e028 a3=aaab138bd010 items=0 ppid=1192 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:14.780000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.902411 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.902489 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.902536 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.906178 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.906251 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.910016 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.910133 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.914015 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.914100 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.917906 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.917977 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.921844 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.921955 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.925760 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.925819 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.929635 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.929697 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.931604 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.935476 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.935527 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.939268 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.939355 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.941228 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.943112 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.946933 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.946995 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.950856 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.950974 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.954762 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.954845 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.958622 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.958708 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.962522 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.962724 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.966365 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.966448 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.970133 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.970231 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.972119 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.976033 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.976112 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.979987 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.980099 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.983974 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.984037 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.987870 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.987965 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.991869 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.991939 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.995725 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.995787 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.999574 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.999666 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.003520 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.003570 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.007465 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.007545 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.009294 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.011242 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.015084 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.015163 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.016962 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.019001 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.020943 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.024853 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.024928 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.026737 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.028751 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.032661 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.032713 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.034560 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.038410 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.038460 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.040266 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.048381 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.048472 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.050183 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.052168 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.055948 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.056036 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.057836 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.059817 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.061702 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.063672 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.065540 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.067490 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.069334 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.071269 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.073078 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.075093 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.076981 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.079003 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.081049 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.082893 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.084894 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.086775 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.088778 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.090622 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.092614 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.096421 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.096508 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.098257 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.100187 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.104028 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.104189 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.107945 kernel: Failed to create system directory sunrpc Nov 1 00:16:15.108057 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.109820 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.111815 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.113688 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.115656 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.117521 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.119486 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.121332 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.123268 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.125080 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.127109 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.129002 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.131109 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.132937 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.134946 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.136848 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.138845 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.140768 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.142635 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.144624 kernel: Failed to create system directory sunrpc Nov 1 00:16:14.887000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.158411 kernel: RPC: Registered named UNIX socket transport module. Nov 1 00:16:15.158551 kernel: RPC: Registered udp transport module. Nov 1 00:16:15.158624 kernel: RPC: Registered tcp transport module. Nov 1 00:16:15.160129 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 1 00:16:14.887000 audit[3693]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab13b2b560 a1=14a804 a2=aaaad7b0e028 a3=aaab138bd010 items=6 ppid=1192 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:14.887000 audit: CWD cwd="/" Nov 1 00:16:14.887000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:14.887000 audit: PATH item=1 name=(null) inode=18829 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:14.887000 audit: PATH item=2 name=(null) inode=18829 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:14.887000 audit: PATH item=3 name=(null) inode=18830 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:14.887000 audit: PATH item=4 name=(null) inode=18829 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:14.887000 audit: PATH item=5 name=(null) inode=18831 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:16:14.887000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.212730 kernel: Failed to create system directory nfs Nov 1 00:16:15.212928 kernel: Failed to create system directory nfs Nov 1 00:16:15.212975 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.216349 kernel: Failed to create system directory nfs Nov 1 00:16:15.216428 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.218038 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.219964 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.223614 kernel: Failed to create system directory nfs Nov 1 00:16:15.223713 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.225871 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.229763 kernel: Failed to create system directory nfs Nov 1 00:16:15.229852 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.231583 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.233341 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.235183 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.238796 kernel: Failed to create system directory nfs Nov 1 00:16:15.238850 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.240567 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.242441 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.244153 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.245976 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.247775 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.249676 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.251436 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.253318 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.255019 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.256989 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.258863 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.262479 kernel: Failed to create system directory nfs Nov 1 00:16:15.262530 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.266197 kernel: Failed to create system directory nfs Nov 1 00:16:15.266249 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.269809 kernel: Failed to create system directory nfs Nov 1 00:16:15.269910 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.273450 kernel: Failed to create system directory nfs Nov 1 00:16:15.273501 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.277045 kernel: Failed to create system directory nfs Nov 1 00:16:15.277128 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.280765 kernel: Failed to create system directory nfs Nov 1 00:16:15.280866 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.284403 kernel: Failed to create system directory nfs Nov 1 00:16:15.284454 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.286135 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.287963 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.289754 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.291630 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.299749 kernel: Failed to create system directory nfs Nov 1 00:16:15.299840 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.303563 kernel: Failed to create system directory nfs Nov 1 00:16:15.303615 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.307326 kernel: Failed to create system directory nfs Nov 1 00:16:15.307390 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.311111 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.313046 kernel: Failed to create system directory nfs Nov 1 00:16:15.313137 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.316843 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.319018 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.321045 kernel: Failed to create system directory nfs Nov 1 00:16:15.321163 kernel: Failed to create system directory nfs Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.200000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.324765 kernel: Failed to create system directory nfs Nov 1 00:16:15.356113 kernel: FS-Cache: Netfs 'nfs' registered for caching Nov 1 00:16:15.200000 audit[3693]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab13cd4b50 a1=116324 a2=aaaad7b0e028 a3=aaab138bd010 items=0 ppid=1192 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:15.200000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.409120 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.409184 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.412847 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.412923 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.416585 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.416657 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.420410 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.420523 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.424231 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.424332 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.427981 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.428109 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.431798 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.431924 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.435644 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.435716 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.439457 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.439541 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.443286 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.443359 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.446934 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.447006 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.450795 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.450906 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.454648 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.454720 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.458444 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.458530 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.462223 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.462296 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.467791 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.467874 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.467920 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.471654 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.471730 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.475413 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.475485 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.479118 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.479196 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.481145 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.484861 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.484955 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.488716 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.488767 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.492466 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.492532 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.496157 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.496241 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.499922 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.499971 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.503666 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.503737 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.507415 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.507508 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.511113 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.511187 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.514907 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.514971 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.518674 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.518768 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.520566 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.522408 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.524228 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.525968 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.529811 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.529890 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.531724 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.533569 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.535442 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.537290 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.539133 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.541019 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.542981 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.548271 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.548389 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.548812 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.550782 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.554521 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.554571 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.556287 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.558276 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.562015 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.562229 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.565941 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.566033 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.570173 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.570260 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.572085 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.575908 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.576001 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.579659 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.579744 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.583391 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.583484 kernel: Failed to create system directory nfs4 Nov 1 00:16:15.393000 audit[3699]: AVC avc: denied { confidentiality } for pid=3699 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.764111 kernel: NFS: Registering the id_resolver key type Nov 1 00:16:15.764292 kernel: Key type id_resolver registered Nov 1 00:16:15.764337 kernel: Key type id_legacy registered Nov 1 00:16:15.393000 audit[3699]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9779a010 a1=19c744 a2=aaaad021e028 a3=aaaad1199010 items=0 ppid=1192 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:15.393000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Nov 1 00:16:15.780532 kubelet[2211]: E1101 00:16:15.780435 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.788302 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.788414 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.788460 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.790139 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.794123 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.794175 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.795977 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.798058 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.800036 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.802628 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.808140 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.808197 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.808271 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.810008 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.812114 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.814053 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.815944 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.818088 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.819965 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.822084 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.824207 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.826186 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.830161 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.830299 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.834131 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.834208 kernel: Failed to create system directory rpcgss Nov 1 00:16:15.780000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:16:15.780000 audit[3701]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8f732010 a1=5eedc a2=aaaacad0e028 a3=aaaae3e44010 items=0 ppid=1192 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:15.780000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Nov 1 00:16:15.864569 nfsidmap[3708]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Nov 1 00:16:15.869762 nfsidmap[3709]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Nov 1 00:16:15.884000 audit[2024]: AVC avc: denied { watch_reads } for pid=2024 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:15.884000 audit[2024]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf4a7a3b0 a2=10 a3=0 items=0 ppid=1 pid=2024 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:15.884000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:16:15.884000 audit[2024]: AVC avc: denied { watch_reads } for pid=2024 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:15.884000 audit[2024]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf4a7a3b0 a2=10 a3=0 items=0 ppid=1 pid=2024 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:15.884000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:16:15.884000 audit[2024]: AVC avc: denied { watch_reads } for pid=2024 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:15.884000 audit[2024]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf4a7a3b0 a2=10 a3=0 items=0 ppid=1 pid=2024 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:15.884000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:16:15.886000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:15.886000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:15.886000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:16:16.045682 env[1828]: time="2025-11-01T00:16:16.045575963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d0334721-993c-40e8-890e-f61b2fdbec0f,Namespace:default,Attempt:0,}" Nov 1 00:16:16.269788 (udev-worker)[3705]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:16:16.273739 systemd-networkd[1548]: cali5ec59c6bf6e: Link UP Nov 1 00:16:16.280611 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:16:16.281133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Nov 1 00:16:16.281256 systemd-networkd[1548]: cali5ec59c6bf6e: Gained carrier Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.138 [INFO][3712] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.96-k8s-test--pod--1-eth0 default d0334721-993c-40e8-890e-f61b2fdbec0f 1569 0 2025-11-01 00:15:47 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.29.96 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.138 [INFO][3712] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-eth0" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.188 [INFO][3724] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" HandleID="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Workload="172.31.29.96-k8s-test--pod--1-eth0" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.189 [INFO][3724] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" HandleID="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Workload="172.31.29.96-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dcfe0), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.96", "pod":"test-pod-1", "timestamp":"2025-11-01 00:16:16.188442052 +0000 UTC"}, Hostname:"172.31.29.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.189 [INFO][3724] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.189 [INFO][3724] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.189 [INFO][3724] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.96' Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.208 [INFO][3724] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.215 [INFO][3724] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.223 [INFO][3724] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.226 [INFO][3724] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.230 [INFO][3724] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.230 [INFO][3724] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.233 [INFO][3724] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679 Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.251 [INFO][3724] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.263 [INFO][3724] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.37.4/26] block=192.168.37.0/26 handle="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.263 [INFO][3724] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.4/26] handle="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" host="172.31.29.96" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.263 [INFO][3724] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.263 [INFO][3724] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.37.4/26] IPv6=[] ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" HandleID="k8s-pod-network.48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Workload="172.31.29.96-k8s-test--pod--1-eth0" Nov 1 00:16:16.309053 env[1828]: 2025-11-01 00:16:16.266 [INFO][3712] cni-plugin/k8s.go 418: Populated endpoint ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d0334721-993c-40e8-890e-f61b2fdbec0f", ResourceVersion:"1569", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:16.310489 env[1828]: 2025-11-01 00:16:16.266 [INFO][3712] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.4/32] ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-eth0" Nov 1 00:16:16.310489 env[1828]: 2025-11-01 00:16:16.267 [INFO][3712] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-eth0" Nov 1 00:16:16.310489 env[1828]: 2025-11-01 00:16:16.283 [INFO][3712] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-eth0" Nov 1 00:16:16.310489 env[1828]: 2025-11-01 00:16:16.286 [INFO][3712] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.96-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d0334721-993c-40e8-890e-f61b2fdbec0f", ResourceVersion:"1569", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 15, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.96", ContainerID:"48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1a:d7:d4:f4:57:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:16:16.310489 env[1828]: 2025-11-01 00:16:16.303 [INFO][3712] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.96-k8s-test--pod--1-eth0" Nov 1 00:16:16.333191 env[1828]: time="2025-11-01T00:16:16.332991548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:16:16.333343 env[1828]: time="2025-11-01T00:16:16.333230135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:16:16.333410 env[1828]: time="2025-11-01T00:16:16.333328705Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:16:16.333936 env[1828]: time="2025-11-01T00:16:16.333849248Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679 pid=3745 runtime=io.containerd.runc.v2 Nov 1 00:16:16.345000 audit[3747]: NETFILTER_CFG table=filter:82 family=2 entries=40 op=nft_register_chain pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:16:16.345000 audit[3747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffd2a1e5f0 a2=0 a3=ffffa0ffefa8 items=0 ppid=2842 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:16:16.364052 systemd[1]: Started cri-containerd-48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679.scope. Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.407000 audit: BPF prog-id=126 op=LOAD Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3745 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653161366261383032663065323536353632346463346563613236 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3745 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653161366261383032663065323536353632346463346563613236 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.409000 audit: BPF prog-id=127 op=LOAD Nov 1 00:16:16.409000 audit[3757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3745 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653161366261383032663065323536353632346463346563613236 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.411000 audit: BPF prog-id=128 op=LOAD Nov 1 00:16:16.411000 audit[3757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3745 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653161366261383032663065323536353632346463346563613236 Nov 1 00:16:16.412000 audit: BPF prog-id=128 op=UNLOAD Nov 1 00:16:16.412000 audit: BPF prog-id=127 op=UNLOAD Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.413000 audit: BPF prog-id=129 op=LOAD Nov 1 00:16:16.413000 audit[3757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3745 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438653161366261383032663065323536353632346463346563613236 Nov 1 00:16:16.457473 env[1828]: time="2025-11-01T00:16:16.457392005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d0334721-993c-40e8-890e-f61b2fdbec0f,Namespace:default,Attempt:0,} returns sandbox id \"48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679\"" Nov 1 00:16:16.460010 env[1828]: time="2025-11-01T00:16:16.459800485Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:16:16.754668 env[1828]: time="2025-11-01T00:16:16.754611818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:16.759181 env[1828]: time="2025-11-01T00:16:16.759133023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:16.763055 env[1828]: time="2025-11-01T00:16:16.763005655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:16.766842 env[1828]: time="2025-11-01T00:16:16.766775998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:16:16.768573 env[1828]: time="2025-11-01T00:16:16.768509698Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Nov 1 00:16:16.778426 env[1828]: time="2025-11-01T00:16:16.778372894Z" level=info msg="CreateContainer within sandbox \"48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679\" for container &ContainerMetadata{Name:test,Attempt:0,}" Nov 1 00:16:16.781379 kubelet[2211]: E1101 00:16:16.781320 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:16.811594 env[1828]: time="2025-11-01T00:16:16.811529557Z" level=info msg="CreateContainer within sandbox \"48e1a6ba802f0e2565624dc4eca264499609e61bfb10cb82ed6c6594ea034679\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0018d96cabc81678246d9d2ec62268726bf968691e24fa390b2a39aa3bad7614\"" Nov 1 00:16:16.813027 env[1828]: time="2025-11-01T00:16:16.812972325Z" level=info msg="StartContainer for \"0018d96cabc81678246d9d2ec62268726bf968691e24fa390b2a39aa3bad7614\"" Nov 1 00:16:16.843897 systemd[1]: Started cri-containerd-0018d96cabc81678246d9d2ec62268726bf968691e24fa390b2a39aa3bad7614.scope. Nov 1 00:16:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.896000 audit: BPF prog-id=130 op=LOAD Nov 1 00:16:16.897000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.897000 audit[3791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3745 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313864393663616263383136373832343664396432656336323236 Nov 1 00:16:16.897000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.897000 audit[3791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3745 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313864393663616263383136373832343664396432656336323236 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.898000 audit: BPF prog-id=131 op=LOAD Nov 1 00:16:16.898000 audit[3791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3745 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313864393663616263383136373832343664396432656336323236 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.899000 audit: BPF prog-id=132 op=LOAD Nov 1 00:16:16.899000 audit[3791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3745 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313864393663616263383136373832343664396432656336323236 Nov 1 00:16:16.900000 audit: BPF prog-id=132 op=UNLOAD Nov 1 00:16:16.901000 audit: BPF prog-id=131 op=UNLOAD Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:16:16.901000 audit: BPF prog-id=133 op=LOAD Nov 1 00:16:16.901000 audit[3791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3745 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:16:16.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313864393663616263383136373832343664396432656336323236 Nov 1 00:16:16.938953 env[1828]: time="2025-11-01T00:16:16.938866249Z" level=info msg="StartContainer for \"0018d96cabc81678246d9d2ec62268726bf968691e24fa390b2a39aa3bad7614\" returns successfully" Nov 1 00:16:17.250487 kubelet[2211]: I1101 00:16:17.250405 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=29.938550323 podStartE2EDuration="30.250384197s" podCreationTimestamp="2025-11-01 00:15:47 +0000 UTC" firstStartedPulling="2025-11-01 00:16:16.459181109 +0000 UTC m=+76.121157341" lastFinishedPulling="2025-11-01 00:16:16.771014995 +0000 UTC m=+76.432991215" observedRunningTime="2025-11-01 00:16:17.250381953 +0000 UTC m=+76.912358209" watchObservedRunningTime="2025-11-01 00:16:17.250384197 +0000 UTC m=+76.912360417" Nov 1 00:16:17.405532 systemd-networkd[1548]: cali5ec59c6bf6e: Gained IPv6LL Nov 1 00:16:17.782446 kubelet[2211]: E1101 00:16:17.782384 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:18.783326 kubelet[2211]: E1101 00:16:18.783286 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:19.784354 kubelet[2211]: E1101 00:16:19.784282 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:20.785294 kubelet[2211]: E1101 00:16:20.785252 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:20.973363 env[1828]: time="2025-11-01T00:16:20.973313126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:16:21.216205 env[1828]: time="2025-11-01T00:16:21.216114470Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:16:21.218391 env[1828]: time="2025-11-01T00:16:21.218285082Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:16:21.218748 kubelet[2211]: E1101 00:16:21.218700 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:16:21.218923 kubelet[2211]: E1101 00:16:21.218891 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:16:21.219172 kubelet[2211]: E1101 00:16:21.219137 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:16:21.221001 env[1828]: time="2025-11-01T00:16:21.220928332Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:16:21.474820 env[1828]: time="2025-11-01T00:16:21.474655356Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:16:21.477002 env[1828]: time="2025-11-01T00:16:21.476876657Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:16:21.477421 kubelet[2211]: E1101 00:16:21.477345 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:16:21.477520 kubelet[2211]: E1101 00:16:21.477434 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:16:21.478323 kubelet[2211]: E1101 00:16:21.477604 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:16:21.478503 kubelet[2211]: E1101 00:16:21.478380 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:16:21.717651 kubelet[2211]: E1101 00:16:21.717581 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:21.786774 kubelet[2211]: E1101 00:16:21.786641 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:22.787164 kubelet[2211]: E1101 00:16:22.787094 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:23.787715 kubelet[2211]: E1101 00:16:23.787652 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:24.788563 kubelet[2211]: E1101 00:16:24.788519 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:25.790028 kubelet[2211]: E1101 00:16:25.789985 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:26.790763 kubelet[2211]: E1101 00:16:26.790721 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:27.791940 kubelet[2211]: E1101 00:16:27.791897 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:28.793737 kubelet[2211]: E1101 00:16:28.793668 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:29.794342 kubelet[2211]: E1101 00:16:29.794285 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:30.794478 kubelet[2211]: E1101 00:16:30.794437 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:31.796152 kubelet[2211]: E1101 00:16:31.796117 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:32.144952 systemd[1]: run-containerd-runc-k8s.io-f82f63a26cd353998f3aee92e0c5e302cbc6207728d03b66e9b8c2f59f6078d6-runc.ltivRr.mount: Deactivated successfully. Nov 1 00:16:32.797191 kubelet[2211]: E1101 00:16:32.797147 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:33.798513 kubelet[2211]: E1101 00:16:33.798455 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:33.976730 kubelet[2211]: E1101 00:16:33.976668 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:16:34.798635 kubelet[2211]: E1101 00:16:34.798592 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:35.799745 kubelet[2211]: E1101 00:16:35.799676 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:36.800414 kubelet[2211]: E1101 00:16:36.800343 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:37.800912 kubelet[2211]: E1101 00:16:37.800871 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:38.802189 kubelet[2211]: E1101 00:16:38.802145 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:39.803570 kubelet[2211]: E1101 00:16:39.803502 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:40.804145 kubelet[2211]: E1101 00:16:40.804085 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:41.717755 kubelet[2211]: E1101 00:16:41.717688 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:41.805057 kubelet[2211]: E1101 00:16:41.804996 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:42.805890 kubelet[2211]: E1101 00:16:42.805851 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:43.807328 kubelet[2211]: E1101 00:16:43.807264 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:44.299047 kubelet[2211]: E1101 00:16:44.298993 2211 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Nov 1 00:16:44.808053 kubelet[2211]: E1101 00:16:44.807982 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:45.809184 kubelet[2211]: E1101 00:16:45.809139 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:46.810598 kubelet[2211]: E1101 00:16:46.810530 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:46.973293 kubelet[2211]: E1101 00:16:46.973188 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:16:47.811337 kubelet[2211]: E1101 00:16:47.811296 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:48.812297 kubelet[2211]: E1101 00:16:48.812255 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:49.813577 kubelet[2211]: E1101 00:16:49.813515 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:50.814092 kubelet[2211]: E1101 00:16:50.814026 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:51.814528 kubelet[2211]: E1101 00:16:51.814458 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:52.815318 kubelet[2211]: E1101 00:16:52.815258 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:53.816198 kubelet[2211]: E1101 00:16:53.816127 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:54.300076 kubelet[2211]: E1101 00:16:54.299969 2211 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Nov 1 00:16:54.816659 kubelet[2211]: E1101 00:16:54.816589 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:55.817691 kubelet[2211]: E1101 00:16:55.817629 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:56.818155 kubelet[2211]: E1101 00:16:56.818058 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:57.818461 kubelet[2211]: E1101 00:16:57.818404 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:58.819585 kubelet[2211]: E1101 00:16:58.819542 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:16:58.973618 kubelet[2211]: E1101 00:16:58.973529 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:16:59.820843 kubelet[2211]: E1101 00:16:59.820774 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:00.821152 kubelet[2211]: E1101 00:17:00.821089 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:01.717876 kubelet[2211]: E1101 00:17:01.717809 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:01.821520 kubelet[2211]: E1101 00:17:01.821459 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:02.152854 systemd[1]: run-containerd-runc-k8s.io-f82f63a26cd353998f3aee92e0c5e302cbc6207728d03b66e9b8c2f59f6078d6-runc.vdRB3h.mount: Deactivated successfully. Nov 1 00:17:02.822198 kubelet[2211]: E1101 00:17:02.822157 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:03.823388 kubelet[2211]: E1101 00:17:03.823345 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:04.301277 kubelet[2211]: E1101 00:17:04.301210 2211 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Nov 1 00:17:04.333741 kubelet[2211]: E1101 00:17:04.333504 2211 event.go:368] "Unable to write event (may retry after sleeping)" err="Patch \"https://172.31.22.79:6443/api/v1/namespaces/calico-system/events/csi-node-driver-tcgnr.1873b9c5f632c1ef\": read tcp 172.31.29.96:53310->172.31.22.79:6443: read: connection reset by peer" event="&Event{ObjectMeta:{csi-node-driver-tcgnr.1873b9c5f632c1ef calico-system 1533 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:csi-node-driver-tcgnr,UID:fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a,APIVersion:v1,ResourceVersion:1012,FieldPath:spec.containers{calico-csi},},Reason:BackOff,Message:Back-off pulling image \"ghcr.io/flatcar/calico/csi:v3.30.4\",Source:EventSource{Component:kubelet,Host:172.31.29.96,},FirstTimestamp:2025-11-01 00:15:39 +0000 UTC,LastTimestamp:2025-11-01 00:16:33.975167638 +0000 UTC m=+93.637143870,Count:3,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.29.96,}" Nov 1 00:17:04.334554 kubelet[2211]: E1101 00:17:04.334498 2211 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": read tcp 172.31.29.96:53310->172.31.22.79:6443: read: connection reset by peer" Nov 1 00:17:04.338366 kubelet[2211]: E1101 00:17:04.338298 2211 controller.go:195] "Failed to update lease" err="Put \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": dial tcp 172.31.22.79:6443: connect: connection refused" Nov 1 00:17:04.338557 kubelet[2211]: I1101 00:17:04.338378 2211 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Nov 1 00:17:04.339489 kubelet[2211]: E1101 00:17:04.339409 2211 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": dial tcp 172.31.22.79:6443: connect: connection refused" interval="200ms" Nov 1 00:17:04.540791 kubelet[2211]: E1101 00:17:04.540709 2211 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": dial tcp 172.31.22.79:6443: connect: connection refused" interval="400ms" Nov 1 00:17:04.824709 kubelet[2211]: E1101 00:17:04.824647 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:04.942346 kubelet[2211]: E1101 00:17:04.942272 2211 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": dial tcp 172.31.22.79:6443: connect: connection refused" interval="800ms" Nov 1 00:17:05.337151 kubelet[2211]: E1101 00:17:05.336498 2211 status_manager.go:1018] "Failed to get status for pod" err="Get \"https://172.31.22.79:6443/api/v1/namespaces/calico-system/pods/csi-node-driver-tcgnr\": dial tcp 172.31.22.79:6443: connect: connection refused - error from a previous attempt: read tcp 172.31.29.96:53310->172.31.22.79:6443: read: connection reset by peer" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:17:05.337363 kubelet[2211]: E1101 00:17:05.337271 2211 status_manager.go:1018] "Failed to get status for pod" err="Get \"https://172.31.22.79:6443/api/v1/namespaces/calico-system/pods/csi-node-driver-tcgnr\": dial tcp 172.31.22.79:6443: connect: connection refused" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:17:05.338720 kubelet[2211]: E1101 00:17:05.338660 2211 status_manager.go:1018] "Failed to get status for pod" err="Get \"https://172.31.22.79:6443/api/v1/namespaces/calico-system/pods/csi-node-driver-tcgnr\": dial tcp 172.31.22.79:6443: connect: connection refused" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" pod="calico-system/csi-node-driver-tcgnr" Nov 1 00:17:05.825877 kubelet[2211]: E1101 00:17:05.825811 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:06.826858 kubelet[2211]: E1101 00:17:06.826815 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:07.828238 kubelet[2211]: E1101 00:17:07.828168 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:08.828780 kubelet[2211]: E1101 00:17:08.828739 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:09.829900 kubelet[2211]: E1101 00:17:09.829859 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:10.830830 kubelet[2211]: E1101 00:17:10.830790 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:11.832474 kubelet[2211]: E1101 00:17:11.832415 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:11.973327 env[1828]: time="2025-11-01T00:17:11.973251837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:17:12.213495 env[1828]: time="2025-11-01T00:17:12.213000348Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:17:12.215922 env[1828]: time="2025-11-01T00:17:12.215845108Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:17:12.216416 kubelet[2211]: E1101 00:17:12.216364 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:17:12.216562 kubelet[2211]: E1101 00:17:12.216447 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:17:12.216645 kubelet[2211]: E1101 00:17:12.216614 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:17:12.218224 env[1828]: time="2025-11-01T00:17:12.218156381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:17:12.456089 env[1828]: time="2025-11-01T00:17:12.456005872Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:17:12.458422 env[1828]: time="2025-11-01T00:17:12.458316078Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:17:12.458743 kubelet[2211]: E1101 00:17:12.458686 2211 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:17:12.459019 kubelet[2211]: E1101 00:17:12.458755 2211 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:17:12.459019 kubelet[2211]: E1101 00:17:12.458924 2211 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-tcgnr_calico-system(fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:17:12.459019 kubelet[2211]: E1101 00:17:12.458989 2211 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-tcgnr" podUID="fc5d5266-26b6-4e2b-a46d-b7a1a4ce337a" Nov 1 00:17:12.833532 kubelet[2211]: E1101 00:17:12.833463 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:13.834045 kubelet[2211]: E1101 00:17:13.833998 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:14.834971 kubelet[2211]: E1101 00:17:14.834899 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:15.743890 kubelet[2211]: E1101 00:17:15.743839 2211 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.79:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.96?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Nov 1 00:17:15.835411 kubelet[2211]: E1101 00:17:15.835349 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:16.835549 kubelet[2211]: E1101 00:17:16.835486 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:17.835961 kubelet[2211]: E1101 00:17:17.835883 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:17:18.836279 kubelet[2211]: E1101 00:17:18.836242 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"