Aug 13 00:55:54.959646 kernel: Linux version 5.15.189-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Aug 12 23:01:50 -00 2025 Aug 13 00:55:54.959678 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 00:55:54.959697 kernel: BIOS-provided physical RAM map: Aug 13 00:55:54.959709 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Aug 13 00:55:54.959719 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable Aug 13 00:55:54.959731 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved Aug 13 00:55:54.959745 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Aug 13 00:55:54.959757 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Aug 13 00:55:54.959771 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable Aug 13 00:55:54.959782 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Aug 13 00:55:54.959794 kernel: NX (Execute Disable) protection: active Aug 13 00:55:54.959805 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Aug 13 00:55:54.959817 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Aug 13 00:55:54.959829 kernel: extended physical RAM map: Aug 13 00:55:54.959847 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Aug 13 00:55:54.959860 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable Aug 13 00:55:54.959872 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable Aug 13 00:55:54.959885 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable Aug 13 00:55:54.959897 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved Aug 13 00:55:54.959910 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Aug 13 00:55:54.959922 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Aug 13 00:55:54.959935 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable Aug 13 00:55:54.959947 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Aug 13 00:55:54.959960 kernel: efi: EFI v2.70 by EDK II Aug 13 00:55:54.959975 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 Aug 13 00:55:54.959987 kernel: SMBIOS 2.7 present. Aug 13 00:55:54.960000 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Aug 13 00:55:54.960012 kernel: Hypervisor detected: KVM Aug 13 00:55:54.960024 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Aug 13 00:55:54.960037 kernel: kvm-clock: cpu 0, msr 3819e001, primary cpu clock Aug 13 00:55:54.960049 kernel: kvm-clock: using sched offset of 3972707752 cycles Aug 13 00:55:54.960063 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Aug 13 00:55:54.960076 kernel: tsc: Detected 2499.996 MHz processor Aug 13 00:55:54.960089 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Aug 13 00:55:54.960101 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Aug 13 00:55:54.960116 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 Aug 13 00:55:54.960129 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Aug 13 00:55:54.960142 kernel: Using GB pages for direct mapping Aug 13 00:55:54.960155 kernel: Secure boot disabled Aug 13 00:55:54.960168 kernel: ACPI: Early table checksum verification disabled Aug 13 00:55:54.960222 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) Aug 13 00:55:54.960235 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) Aug 13 00:55:54.960248 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Aug 13 00:55:54.960259 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Aug 13 00:55:54.960270 kernel: ACPI: FACS 0x00000000789D0000 000040 Aug 13 00:55:54.960282 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Aug 13 00:55:54.960293 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Aug 13 00:55:54.960306 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Aug 13 00:55:54.960319 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Aug 13 00:55:54.960336 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Aug 13 00:55:54.960350 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Aug 13 00:55:54.960364 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Aug 13 00:55:54.960378 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) Aug 13 00:55:54.960392 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] Aug 13 00:55:54.960406 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] Aug 13 00:55:54.960420 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] Aug 13 00:55:54.960434 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] Aug 13 00:55:54.960448 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] Aug 13 00:55:54.960465 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] Aug 13 00:55:54.960479 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] Aug 13 00:55:54.960493 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] Aug 13 00:55:54.960506 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] Aug 13 00:55:54.960520 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] Aug 13 00:55:54.960534 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] Aug 13 00:55:54.960548 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Aug 13 00:55:54.960562 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Aug 13 00:55:54.960576 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Aug 13 00:55:54.960592 kernel: NUMA: Initialized distance table, cnt=1 Aug 13 00:55:54.960606 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] Aug 13 00:55:54.960620 kernel: Zone ranges: Aug 13 00:55:54.960634 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Aug 13 00:55:54.960649 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] Aug 13 00:55:54.960662 kernel: Normal empty Aug 13 00:55:54.960676 kernel: Movable zone start for each node Aug 13 00:55:54.960690 kernel: Early memory node ranges Aug 13 00:55:54.960704 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Aug 13 00:55:54.960721 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] Aug 13 00:55:54.960735 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] Aug 13 00:55:54.960749 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] Aug 13 00:55:54.960763 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Aug 13 00:55:54.960777 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Aug 13 00:55:54.960791 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Aug 13 00:55:54.960805 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges Aug 13 00:55:54.960819 kernel: ACPI: PM-Timer IO Port: 0xb008 Aug 13 00:55:54.960832 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Aug 13 00:55:54.960849 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Aug 13 00:55:54.960863 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Aug 13 00:55:54.960877 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Aug 13 00:55:54.960891 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Aug 13 00:55:54.960905 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Aug 13 00:55:54.960919 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Aug 13 00:55:54.960933 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Aug 13 00:55:54.960947 kernel: TSC deadline timer available Aug 13 00:55:54.960961 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Aug 13 00:55:54.960975 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices Aug 13 00:55:54.960992 kernel: Booting paravirtualized kernel on KVM Aug 13 00:55:54.961006 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Aug 13 00:55:54.961020 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Aug 13 00:55:54.961034 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Aug 13 00:55:54.961048 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Aug 13 00:55:54.961062 kernel: pcpu-alloc: [0] 0 1 Aug 13 00:55:54.961076 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 Aug 13 00:55:54.961090 kernel: kvm-guest: PV spinlocks enabled Aug 13 00:55:54.961104 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Aug 13 00:55:54.961120 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 Aug 13 00:55:54.961134 kernel: Policy zone: DMA32 Aug 13 00:55:54.961151 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 00:55:54.961165 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Aug 13 00:55:54.961179 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Aug 13 00:55:54.961205 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Aug 13 00:55:54.961217 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Aug 13 00:55:54.961232 kernel: Memory: 1876640K/2037804K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47488K init, 4092K bss, 160904K reserved, 0K cma-reserved) Aug 13 00:55:54.961244 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Aug 13 00:55:54.961256 kernel: Kernel/User page tables isolation: enabled Aug 13 00:55:54.961268 kernel: ftrace: allocating 34608 entries in 136 pages Aug 13 00:55:54.961282 kernel: ftrace: allocated 136 pages with 2 groups Aug 13 00:55:54.961294 kernel: rcu: Hierarchical RCU implementation. Aug 13 00:55:54.961306 kernel: rcu: RCU event tracing is enabled. Aug 13 00:55:54.961331 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Aug 13 00:55:54.961343 kernel: Rude variant of Tasks RCU enabled. Aug 13 00:55:54.961355 kernel: Tracing variant of Tasks RCU enabled. Aug 13 00:55:54.961367 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Aug 13 00:55:54.961381 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Aug 13 00:55:54.961397 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Aug 13 00:55:54.961411 kernel: random: crng init done Aug 13 00:55:54.961424 kernel: Console: colour dummy device 80x25 Aug 13 00:55:54.961438 kernel: printk: console [tty0] enabled Aug 13 00:55:54.961452 kernel: printk: console [ttyS0] enabled Aug 13 00:55:54.961466 kernel: ACPI: Core revision 20210730 Aug 13 00:55:54.961480 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Aug 13 00:55:54.961497 kernel: APIC: Switch to symmetric I/O mode setup Aug 13 00:55:54.961511 kernel: x2apic enabled Aug 13 00:55:54.961525 kernel: Switched APIC routing to physical x2apic. Aug 13 00:55:54.961539 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Aug 13 00:55:54.961553 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Aug 13 00:55:54.961567 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Aug 13 00:55:54.961580 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Aug 13 00:55:54.961596 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Aug 13 00:55:54.961609 kernel: Spectre V2 : Mitigation: Retpolines Aug 13 00:55:54.961621 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Aug 13 00:55:54.961634 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Aug 13 00:55:54.961648 kernel: RETBleed: Vulnerable Aug 13 00:55:54.961661 kernel: Speculative Store Bypass: Vulnerable Aug 13 00:55:54.961675 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Aug 13 00:55:54.961687 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Aug 13 00:55:54.961701 kernel: GDS: Unknown: Dependent on hypervisor status Aug 13 00:55:54.961715 kernel: ITS: Mitigation: Aligned branch/return thunks Aug 13 00:55:54.961730 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Aug 13 00:55:54.961747 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Aug 13 00:55:54.961760 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Aug 13 00:55:54.961774 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Aug 13 00:55:54.961789 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Aug 13 00:55:54.961803 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Aug 13 00:55:54.961817 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Aug 13 00:55:54.961830 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Aug 13 00:55:54.961842 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Aug 13 00:55:54.961854 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Aug 13 00:55:54.961866 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Aug 13 00:55:54.961877 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Aug 13 00:55:54.961894 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Aug 13 00:55:54.961905 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Aug 13 00:55:54.961918 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Aug 13 00:55:54.961930 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Aug 13 00:55:54.961942 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Aug 13 00:55:54.961955 kernel: Freeing SMP alternatives memory: 32K Aug 13 00:55:54.961967 kernel: pid_max: default: 32768 minimum: 301 Aug 13 00:55:54.961980 kernel: LSM: Security Framework initializing Aug 13 00:55:54.961992 kernel: SELinux: Initializing. Aug 13 00:55:54.962004 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Aug 13 00:55:54.962017 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Aug 13 00:55:54.962033 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Aug 13 00:55:54.962045 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Aug 13 00:55:54.962058 kernel: signal: max sigframe size: 3632 Aug 13 00:55:54.962072 kernel: rcu: Hierarchical SRCU implementation. Aug 13 00:55:54.962085 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Aug 13 00:55:54.962096 kernel: smp: Bringing up secondary CPUs ... Aug 13 00:55:54.968049 kernel: x86: Booting SMP configuration: Aug 13 00:55:54.968078 kernel: .... node #0, CPUs: #1 Aug 13 00:55:54.968094 kernel: kvm-clock: cpu 1, msr 3819e041, secondary cpu clock Aug 13 00:55:54.968109 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 Aug 13 00:55:54.968130 kernel: Transient Scheduler Attacks: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Aug 13 00:55:54.968147 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Aug 13 00:55:54.968162 kernel: smp: Brought up 1 node, 2 CPUs Aug 13 00:55:54.968177 kernel: smpboot: Max logical packages: 1 Aug 13 00:55:54.968211 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Aug 13 00:55:54.968227 kernel: devtmpfs: initialized Aug 13 00:55:54.968241 kernel: x86/mm: Memory block size: 128MB Aug 13 00:55:54.968256 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) Aug 13 00:55:54.968275 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Aug 13 00:55:54.968290 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Aug 13 00:55:54.968305 kernel: pinctrl core: initialized pinctrl subsystem Aug 13 00:55:54.968320 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Aug 13 00:55:54.968335 kernel: audit: initializing netlink subsys (disabled) Aug 13 00:55:54.968351 kernel: audit: type=2000 audit(1755046553.805:1): state=initialized audit_enabled=0 res=1 Aug 13 00:55:54.968366 kernel: thermal_sys: Registered thermal governor 'step_wise' Aug 13 00:55:54.968380 kernel: thermal_sys: Registered thermal governor 'user_space' Aug 13 00:55:54.968395 kernel: cpuidle: using governor menu Aug 13 00:55:54.968413 kernel: ACPI: bus type PCI registered Aug 13 00:55:54.968428 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Aug 13 00:55:54.968442 kernel: dca service started, version 1.12.1 Aug 13 00:55:54.968457 kernel: PCI: Using configuration type 1 for base access Aug 13 00:55:54.968472 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Aug 13 00:55:54.968488 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Aug 13 00:55:54.968503 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Aug 13 00:55:54.968518 kernel: ACPI: Added _OSI(Module Device) Aug 13 00:55:54.968533 kernel: ACPI: Added _OSI(Processor Device) Aug 13 00:55:54.968551 kernel: ACPI: Added _OSI(Processor Aggregator Device) Aug 13 00:55:54.968566 kernel: ACPI: Added _OSI(Linux-Dell-Video) Aug 13 00:55:54.968580 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Aug 13 00:55:54.968595 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Aug 13 00:55:54.968610 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Aug 13 00:55:54.968625 kernel: ACPI: Interpreter enabled Aug 13 00:55:54.968639 kernel: ACPI: PM: (supports S0 S5) Aug 13 00:55:54.968654 kernel: ACPI: Using IOAPIC for interrupt routing Aug 13 00:55:54.968669 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Aug 13 00:55:54.968687 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Aug 13 00:55:54.968702 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Aug 13 00:55:54.968918 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Aug 13 00:55:54.969068 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Aug 13 00:55:54.969087 kernel: acpiphp: Slot [3] registered Aug 13 00:55:54.969102 kernel: acpiphp: Slot [4] registered Aug 13 00:55:54.969117 kernel: acpiphp: Slot [5] registered Aug 13 00:55:54.969131 kernel: acpiphp: Slot [6] registered Aug 13 00:55:54.969150 kernel: acpiphp: Slot [7] registered Aug 13 00:55:54.969165 kernel: acpiphp: Slot [8] registered Aug 13 00:55:54.969180 kernel: acpiphp: Slot [9] registered Aug 13 00:55:54.969221 kernel: acpiphp: Slot [10] registered Aug 13 00:55:54.969236 kernel: acpiphp: Slot [11] registered Aug 13 00:55:54.969251 kernel: acpiphp: Slot [12] registered Aug 13 00:55:54.969265 kernel: acpiphp: Slot [13] registered Aug 13 00:55:54.969281 kernel: acpiphp: Slot [14] registered Aug 13 00:55:54.969295 kernel: acpiphp: Slot [15] registered Aug 13 00:55:54.969313 kernel: acpiphp: Slot [16] registered Aug 13 00:55:54.969328 kernel: acpiphp: Slot [17] registered Aug 13 00:55:54.969343 kernel: acpiphp: Slot [18] registered Aug 13 00:55:54.969357 kernel: acpiphp: Slot [19] registered Aug 13 00:55:54.969372 kernel: acpiphp: Slot [20] registered Aug 13 00:55:54.969387 kernel: acpiphp: Slot [21] registered Aug 13 00:55:54.969402 kernel: acpiphp: Slot [22] registered Aug 13 00:55:54.969416 kernel: acpiphp: Slot [23] registered Aug 13 00:55:54.969431 kernel: acpiphp: Slot [24] registered Aug 13 00:55:54.969446 kernel: acpiphp: Slot [25] registered Aug 13 00:55:54.969463 kernel: acpiphp: Slot [26] registered Aug 13 00:55:54.969478 kernel: acpiphp: Slot [27] registered Aug 13 00:55:54.969493 kernel: acpiphp: Slot [28] registered Aug 13 00:55:54.969508 kernel: acpiphp: Slot [29] registered Aug 13 00:55:54.969523 kernel: acpiphp: Slot [30] registered Aug 13 00:55:54.969537 kernel: acpiphp: Slot [31] registered Aug 13 00:55:54.969551 kernel: PCI host bridge to bus 0000:00 Aug 13 00:55:54.969685 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Aug 13 00:55:54.969806 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Aug 13 00:55:54.969924 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Aug 13 00:55:54.970041 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Aug 13 00:55:54.970156 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] Aug 13 00:55:54.970294 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Aug 13 00:55:54.970452 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Aug 13 00:55:54.970606 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Aug 13 00:55:54.970753 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Aug 13 00:55:54.970890 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Aug 13 00:55:54.971027 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Aug 13 00:55:54.971154 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Aug 13 00:55:54.971303 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Aug 13 00:55:54.971436 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Aug 13 00:55:54.971575 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Aug 13 00:55:54.971711 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Aug 13 00:55:54.971846 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Aug 13 00:55:54.971985 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] Aug 13 00:55:54.972121 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Aug 13 00:55:54.972282 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb Aug 13 00:55:54.972420 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Aug 13 00:55:54.972569 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Aug 13 00:55:54.972704 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] Aug 13 00:55:54.972844 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Aug 13 00:55:54.972979 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] Aug 13 00:55:54.973002 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Aug 13 00:55:54.973018 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Aug 13 00:55:54.973034 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Aug 13 00:55:54.973053 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Aug 13 00:55:54.973068 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Aug 13 00:55:54.973083 kernel: iommu: Default domain type: Translated Aug 13 00:55:54.973099 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Aug 13 00:55:54.973293 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Aug 13 00:55:54.973436 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Aug 13 00:55:54.973569 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Aug 13 00:55:54.973589 kernel: vgaarb: loaded Aug 13 00:55:54.973606 kernel: pps_core: LinuxPPS API ver. 1 registered Aug 13 00:55:54.973626 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Aug 13 00:55:54.973641 kernel: PTP clock support registered Aug 13 00:55:54.973656 kernel: Registered efivars operations Aug 13 00:55:54.973671 kernel: PCI: Using ACPI for IRQ routing Aug 13 00:55:54.973686 kernel: PCI: pci_cache_line_size set to 64 bytes Aug 13 00:55:54.973702 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] Aug 13 00:55:54.973716 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] Aug 13 00:55:54.973731 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] Aug 13 00:55:54.973747 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Aug 13 00:55:54.973766 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Aug 13 00:55:54.973781 kernel: clocksource: Switched to clocksource kvm-clock Aug 13 00:55:54.973797 kernel: VFS: Disk quotas dquot_6.6.0 Aug 13 00:55:54.973813 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Aug 13 00:55:54.973828 kernel: pnp: PnP ACPI init Aug 13 00:55:54.973843 kernel: pnp: PnP ACPI: found 5 devices Aug 13 00:55:54.973859 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Aug 13 00:55:54.973874 kernel: NET: Registered PF_INET protocol family Aug 13 00:55:54.973890 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Aug 13 00:55:54.973908 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Aug 13 00:55:54.973924 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Aug 13 00:55:54.973940 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Aug 13 00:55:54.973957 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Aug 13 00:55:54.973974 kernel: TCP: Hash tables configured (established 16384 bind 16384) Aug 13 00:55:54.973990 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Aug 13 00:55:54.974006 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Aug 13 00:55:54.974022 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Aug 13 00:55:54.974039 kernel: NET: Registered PF_XDP protocol family Aug 13 00:55:54.974171 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Aug 13 00:55:54.974385 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Aug 13 00:55:54.974505 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Aug 13 00:55:54.974637 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Aug 13 00:55:54.974763 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] Aug 13 00:55:54.974902 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Aug 13 00:55:54.975048 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Aug 13 00:55:54.975073 kernel: PCI: CLS 0 bytes, default 64 Aug 13 00:55:54.975090 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Aug 13 00:55:54.975108 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Aug 13 00:55:54.975124 kernel: clocksource: Switched to clocksource tsc Aug 13 00:55:54.975140 kernel: Initialise system trusted keyrings Aug 13 00:55:54.975156 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Aug 13 00:55:54.975172 kernel: Key type asymmetric registered Aug 13 00:55:54.975197 kernel: Asymmetric key parser 'x509' registered Aug 13 00:55:54.975211 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Aug 13 00:55:54.975227 kernel: io scheduler mq-deadline registered Aug 13 00:55:54.975241 kernel: io scheduler kyber registered Aug 13 00:55:54.975256 kernel: io scheduler bfq registered Aug 13 00:55:54.975271 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Aug 13 00:55:54.975286 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Aug 13 00:55:54.975301 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Aug 13 00:55:54.975317 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Aug 13 00:55:54.975332 kernel: i8042: Warning: Keylock active Aug 13 00:55:54.975348 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Aug 13 00:55:54.975366 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Aug 13 00:55:54.975509 kernel: rtc_cmos 00:00: RTC can wake from S4 Aug 13 00:55:54.975635 kernel: rtc_cmos 00:00: registered as rtc0 Aug 13 00:55:54.975755 kernel: rtc_cmos 00:00: setting system clock to 2025-08-13T00:55:54 UTC (1755046554) Aug 13 00:55:54.975873 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Aug 13 00:55:54.975891 kernel: intel_pstate: CPU model not supported Aug 13 00:55:54.975907 kernel: efifb: probing for efifb Aug 13 00:55:54.975922 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k Aug 13 00:55:54.975941 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Aug 13 00:55:54.975955 kernel: efifb: scrolling: redraw Aug 13 00:55:54.975971 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Aug 13 00:55:54.975985 kernel: Console: switching to colour frame buffer device 100x37 Aug 13 00:55:54.976001 kernel: fb0: EFI VGA frame buffer device Aug 13 00:55:54.976016 kernel: pstore: Registered efi as persistent store backend Aug 13 00:55:54.976054 kernel: NET: Registered PF_INET6 protocol family Aug 13 00:55:54.976072 kernel: Segment Routing with IPv6 Aug 13 00:55:54.976089 kernel: In-situ OAM (IOAM) with IPv6 Aug 13 00:55:54.976107 kernel: NET: Registered PF_PACKET protocol family Aug 13 00:55:54.976123 kernel: Key type dns_resolver registered Aug 13 00:55:54.976138 kernel: IPI shorthand broadcast: enabled Aug 13 00:55:54.976154 kernel: sched_clock: Marking stable (373805939, 136560120)->(576924759, -66558700) Aug 13 00:55:54.976170 kernel: registered taskstats version 1 Aug 13 00:55:54.976186 kernel: Loading compiled-in X.509 certificates Aug 13 00:55:54.976223 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.189-flatcar: 1d5a64b5798e654719a8bd91d683e7e9894bd433' Aug 13 00:55:54.976239 kernel: Key type .fscrypt registered Aug 13 00:55:54.976254 kernel: Key type fscrypt-provisioning registered Aug 13 00:55:54.976272 kernel: pstore: Using crash dump compression: deflate Aug 13 00:55:54.976289 kernel: ima: No TPM chip found, activating TPM-bypass! Aug 13 00:55:54.976304 kernel: ima: Allocated hash algorithm: sha1 Aug 13 00:55:54.976321 kernel: ima: No architecture policies found Aug 13 00:55:54.976336 kernel: clk: Disabling unused clocks Aug 13 00:55:54.976352 kernel: Freeing unused kernel image (initmem) memory: 47488K Aug 13 00:55:54.976370 kernel: Write protecting the kernel read-only data: 28672k Aug 13 00:55:54.976386 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Aug 13 00:55:54.976401 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Aug 13 00:55:54.976420 kernel: Run /init as init process Aug 13 00:55:54.976435 kernel: with arguments: Aug 13 00:55:54.976451 kernel: /init Aug 13 00:55:54.976466 kernel: with environment: Aug 13 00:55:54.976482 kernel: HOME=/ Aug 13 00:55:54.976498 kernel: TERM=linux Aug 13 00:55:54.976513 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Aug 13 00:55:54.976533 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 00:55:54.976555 systemd[1]: Detected virtualization amazon. Aug 13 00:55:54.976572 systemd[1]: Detected architecture x86-64. Aug 13 00:55:54.976588 systemd[1]: Running in initrd. Aug 13 00:55:54.976604 systemd[1]: No hostname configured, using default hostname. Aug 13 00:55:54.976620 systemd[1]: Hostname set to . Aug 13 00:55:54.976637 systemd[1]: Initializing machine ID from VM UUID. Aug 13 00:55:54.976653 systemd[1]: Queued start job for default target initrd.target. Aug 13 00:55:54.976669 systemd[1]: Started systemd-ask-password-console.path. Aug 13 00:55:54.976688 systemd[1]: Reached target cryptsetup.target. Aug 13 00:55:54.976704 systemd[1]: Reached target paths.target. Aug 13 00:55:54.976720 systemd[1]: Reached target slices.target. Aug 13 00:55:54.976736 systemd[1]: Reached target swap.target. Aug 13 00:55:54.976752 systemd[1]: Reached target timers.target. Aug 13 00:55:54.976771 systemd[1]: Listening on iscsid.socket. Aug 13 00:55:54.976787 systemd[1]: Listening on iscsiuio.socket. Aug 13 00:55:54.976807 systemd[1]: Listening on systemd-journald-audit.socket. Aug 13 00:55:54.976823 systemd[1]: Listening on systemd-journald-dev-log.socket. Aug 13 00:55:54.976839 systemd[1]: Listening on systemd-journald.socket. Aug 13 00:55:54.976856 systemd[1]: Listening on systemd-networkd.socket. Aug 13 00:55:54.976872 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 00:55:54.976888 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 00:55:54.976907 systemd[1]: Reached target sockets.target. Aug 13 00:55:54.976923 systemd[1]: Starting kmod-static-nodes.service... Aug 13 00:55:54.976939 systemd[1]: Finished network-cleanup.service. Aug 13 00:55:54.976956 systemd[1]: Starting systemd-fsck-usr.service... Aug 13 00:55:54.976972 systemd[1]: Starting systemd-journald.service... Aug 13 00:55:54.976988 systemd[1]: Starting systemd-modules-load.service... Aug 13 00:55:54.977005 systemd[1]: Starting systemd-resolved.service... Aug 13 00:55:54.977021 systemd[1]: Starting systemd-vconsole-setup.service... Aug 13 00:55:54.977043 systemd-journald[185]: Journal started Aug 13 00:55:54.977117 systemd-journald[185]: Runtime Journal (/run/log/journal/ec26d435b2f4743c6c5e2c6bc3673b5e) is 4.8M, max 38.3M, 33.5M free. Aug 13 00:55:54.982233 systemd[1]: Started systemd-journald.service. Aug 13 00:55:54.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:54.984281 systemd-modules-load[186]: Inserted module 'overlay' Aug 13 00:55:54.992903 kernel: audit: type=1130 audit(1755046554.984:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:54.993242 systemd[1]: Finished kmod-static-nodes.service. Aug 13 00:55:54.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.004240 kernel: audit: type=1130 audit(1755046554.995:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.004387 systemd[1]: Finished systemd-fsck-usr.service. Aug 13 00:55:55.012357 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Aug 13 00:55:55.013787 systemd[1]: Finished systemd-vconsole-setup.service. Aug 13 00:55:55.017334 systemd[1]: Starting dracut-cmdline-ask.service... Aug 13 00:55:55.051379 kernel: audit: type=1130 audit(1755046555.012:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.051414 kernel: audit: type=1130 audit(1755046555.013:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.056208 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Aug 13 00:55:55.057291 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Aug 13 00:55:55.061711 systemd[1]: Finished dracut-cmdline-ask.service. Aug 13 00:55:55.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.070210 kernel: audit: type=1130 audit(1755046555.062:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.072415 systemd[1]: Starting dracut-cmdline.service... Aug 13 00:55:55.079146 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Aug 13 00:55:55.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.089216 kernel: audit: type=1130 audit(1755046555.080:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.089273 kernel: Bridge firewalling registered Aug 13 00:55:55.092057 systemd-modules-load[186]: Inserted module 'br_netfilter' Aug 13 00:55:55.092814 systemd-resolved[187]: Positive Trust Anchors: Aug 13 00:55:55.092825 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 00:55:55.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.092878 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 00:55:55.116340 kernel: audit: type=1130 audit(1755046555.099:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.116378 dracut-cmdline[202]: dracut-dracut-053 Aug 13 00:55:55.116378 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 00:55:55.097791 systemd-resolved[187]: Defaulting to hostname 'linux'. Aug 13 00:55:55.099724 systemd[1]: Started systemd-resolved.service. Aug 13 00:55:55.100968 systemd[1]: Reached target nss-lookup.target. Aug 13 00:55:55.136484 kernel: SCSI subsystem initialized Aug 13 00:55:55.157038 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Aug 13 00:55:55.157101 kernel: device-mapper: uevent: version 1.0.3 Aug 13 00:55:55.158085 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Aug 13 00:55:55.164446 systemd-modules-load[186]: Inserted module 'dm_multipath' Aug 13 00:55:55.165320 systemd[1]: Finished systemd-modules-load.service. Aug 13 00:55:55.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.169537 systemd[1]: Starting systemd-sysctl.service... Aug 13 00:55:55.178874 kernel: audit: type=1130 audit(1755046555.167:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.186484 systemd[1]: Finished systemd-sysctl.service. Aug 13 00:55:55.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.196321 kernel: audit: type=1130 audit(1755046555.186:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.207214 kernel: Loading iSCSI transport class v2.0-870. Aug 13 00:55:55.226212 kernel: iscsi: registered transport (tcp) Aug 13 00:55:55.251199 kernel: iscsi: registered transport (qla4xxx) Aug 13 00:55:55.251283 kernel: QLogic iSCSI HBA Driver Aug 13 00:55:55.283080 systemd[1]: Finished dracut-cmdline.service. Aug 13 00:55:55.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.285060 systemd[1]: Starting dracut-pre-udev.service... Aug 13 00:55:55.336248 kernel: raid6: avx512x4 gen() 18208 MB/s Aug 13 00:55:55.354217 kernel: raid6: avx512x4 xor() 8328 MB/s Aug 13 00:55:55.372220 kernel: raid6: avx512x2 gen() 18060 MB/s Aug 13 00:55:55.390216 kernel: raid6: avx512x2 xor() 24406 MB/s Aug 13 00:55:55.408216 kernel: raid6: avx512x1 gen() 18142 MB/s Aug 13 00:55:55.426215 kernel: raid6: avx512x1 xor() 21831 MB/s Aug 13 00:55:55.444218 kernel: raid6: avx2x4 gen() 17938 MB/s Aug 13 00:55:55.462214 kernel: raid6: avx2x4 xor() 7395 MB/s Aug 13 00:55:55.480215 kernel: raid6: avx2x2 gen() 18055 MB/s Aug 13 00:55:55.498214 kernel: raid6: avx2x2 xor() 18160 MB/s Aug 13 00:55:55.516218 kernel: raid6: avx2x1 gen() 13923 MB/s Aug 13 00:55:55.534216 kernel: raid6: avx2x1 xor() 15851 MB/s Aug 13 00:55:55.552213 kernel: raid6: sse2x4 gen() 9550 MB/s Aug 13 00:55:55.570213 kernel: raid6: sse2x4 xor() 6047 MB/s Aug 13 00:55:55.588212 kernel: raid6: sse2x2 gen() 10573 MB/s Aug 13 00:55:55.606211 kernel: raid6: sse2x2 xor() 6121 MB/s Aug 13 00:55:55.624212 kernel: raid6: sse2x1 gen() 9429 MB/s Aug 13 00:55:55.642478 kernel: raid6: sse2x1 xor() 4837 MB/s Aug 13 00:55:55.642517 kernel: raid6: using algorithm avx512x4 gen() 18208 MB/s Aug 13 00:55:55.642536 kernel: raid6: .... xor() 8328 MB/s, rmw enabled Aug 13 00:55:55.643598 kernel: raid6: using avx512x2 recovery algorithm Aug 13 00:55:55.658220 kernel: xor: automatically using best checksumming function avx Aug 13 00:55:55.761217 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Aug 13 00:55:55.769599 systemd[1]: Finished dracut-pre-udev.service. Aug 13 00:55:55.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.769000 audit: BPF prog-id=7 op=LOAD Aug 13 00:55:55.769000 audit: BPF prog-id=8 op=LOAD Aug 13 00:55:55.771076 systemd[1]: Starting systemd-udevd.service... Aug 13 00:55:55.784213 systemd-udevd[384]: Using default interface naming scheme 'v252'. Aug 13 00:55:55.789580 systemd[1]: Started systemd-udevd.service. Aug 13 00:55:55.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.793746 systemd[1]: Starting dracut-pre-trigger.service... Aug 13 00:55:55.811669 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Aug 13 00:55:55.841834 systemd[1]: Finished dracut-pre-trigger.service. Aug 13 00:55:55.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.843284 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 00:55:55.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:55.886212 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 00:55:55.940214 kernel: cryptd: max_cpu_qlen set to 1000 Aug 13 00:55:55.980533 kernel: AVX2 version of gcm_enc/dec engaged. Aug 13 00:55:55.980590 kernel: AES CTR mode by8 optimization enabled Aug 13 00:55:55.986213 kernel: nvme nvme0: pci function 0000:00:04.0 Aug 13 00:55:55.986475 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Aug 13 00:55:55.998425 kernel: ena 0000:00:05.0: ENA device version: 0.10 Aug 13 00:55:56.008239 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Aug 13 00:55:56.008358 kernel: nvme nvme0: 2/0/0 default/read/poll queues Aug 13 00:55:56.008463 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Aug 13 00:55:56.008557 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:d5:1d:88:50:99 Aug 13 00:55:56.011983 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Aug 13 00:55:56.012035 kernel: GPT:9289727 != 16777215 Aug 13 00:55:56.012048 kernel: GPT:Alternate GPT header not at the end of the disk. Aug 13 00:55:56.013324 kernel: GPT:9289727 != 16777215 Aug 13 00:55:56.014299 kernel: GPT: Use GNU Parted to correct GPT errors. Aug 13 00:55:56.016583 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:55:56.023332 (udev-worker)[432]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:55:56.077211 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (429) Aug 13 00:55:56.087223 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Aug 13 00:55:56.109202 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 00:55:56.118502 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Aug 13 00:55:56.119790 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Aug 13 00:55:56.126919 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Aug 13 00:55:56.128326 systemd[1]: Starting disk-uuid.service... Aug 13 00:55:56.133397 disk-uuid[593]: Primary Header is updated. Aug 13 00:55:56.133397 disk-uuid[593]: Secondary Entries is updated. Aug 13 00:55:56.133397 disk-uuid[593]: Secondary Header is updated. Aug 13 00:55:56.148209 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:55:57.144912 disk-uuid[594]: The operation has completed successfully. Aug 13 00:55:57.145687 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:55:57.264054 systemd[1]: disk-uuid.service: Deactivated successfully. Aug 13 00:55:57.264172 systemd[1]: Finished disk-uuid.service. Aug 13 00:55:57.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.274795 systemd[1]: Starting verity-setup.service... Aug 13 00:55:57.301209 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Aug 13 00:55:57.390048 systemd[1]: Found device dev-mapper-usr.device. Aug 13 00:55:57.391527 systemd[1]: Mounting sysusr-usr.mount... Aug 13 00:55:57.393633 systemd[1]: Finished verity-setup.service. Aug 13 00:55:57.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.478209 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Aug 13 00:55:57.478869 systemd[1]: Mounted sysusr-usr.mount. Aug 13 00:55:57.479643 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Aug 13 00:55:57.480367 systemd[1]: Starting ignition-setup.service... Aug 13 00:55:57.483070 systemd[1]: Starting parse-ip-for-networkd.service... Aug 13 00:55:57.504100 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Aug 13 00:55:57.504171 kernel: BTRFS info (device nvme0n1p6): using free space tree Aug 13 00:55:57.504215 kernel: BTRFS info (device nvme0n1p6): has skinny extents Aug 13 00:55:57.540215 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Aug 13 00:55:57.554863 systemd[1]: mnt-oem.mount: Deactivated successfully. Aug 13 00:55:57.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.568264 systemd[1]: Finished ignition-setup.service. Aug 13 00:55:57.569880 systemd[1]: Starting ignition-fetch-offline.service... Aug 13 00:55:57.573349 systemd[1]: Finished parse-ip-for-networkd.service. Aug 13 00:55:57.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.574000 audit: BPF prog-id=9 op=LOAD Aug 13 00:55:57.576482 systemd[1]: Starting systemd-networkd.service... Aug 13 00:55:57.600072 systemd-networkd[1022]: lo: Link UP Aug 13 00:55:57.600087 systemd-networkd[1022]: lo: Gained carrier Aug 13 00:55:57.601091 systemd-networkd[1022]: Enumeration completed Aug 13 00:55:57.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.601306 systemd[1]: Started systemd-networkd.service. Aug 13 00:55:57.601710 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 00:55:57.603920 systemd[1]: Reached target network.target. Aug 13 00:55:57.605452 systemd-networkd[1022]: eth0: Link UP Aug 13 00:55:57.605457 systemd-networkd[1022]: eth0: Gained carrier Aug 13 00:55:57.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.606488 systemd[1]: Starting iscsiuio.service... Aug 13 00:55:57.614400 systemd[1]: Started iscsiuio.service. Aug 13 00:55:57.616354 systemd[1]: Starting iscsid.service... Aug 13 00:55:57.620904 iscsid[1027]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Aug 13 00:55:57.620904 iscsid[1027]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Aug 13 00:55:57.620904 iscsid[1027]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Aug 13 00:55:57.620904 iscsid[1027]: If using hardware iscsi like qla4xxx this message can be ignored. Aug 13 00:55:57.620904 iscsid[1027]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Aug 13 00:55:57.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.634014 iscsid[1027]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Aug 13 00:55:57.621310 systemd-networkd[1022]: eth0: DHCPv4 address 172.31.31.30/20, gateway 172.31.16.1 acquired from 172.31.16.1 Aug 13 00:55:57.625415 systemd[1]: Started iscsid.service. Aug 13 00:55:57.628437 systemd[1]: Starting dracut-initqueue.service... Aug 13 00:55:57.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.643685 systemd[1]: Finished dracut-initqueue.service. Aug 13 00:55:57.644935 systemd[1]: Reached target remote-fs-pre.target. Aug 13 00:55:57.645785 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 00:55:57.647072 systemd[1]: Reached target remote-fs.target. Aug 13 00:55:57.649433 systemd[1]: Starting dracut-pre-mount.service... Aug 13 00:55:57.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:57.659410 systemd[1]: Finished dracut-pre-mount.service. Aug 13 00:55:58.062377 ignition[1021]: Ignition 2.14.0 Aug 13 00:55:58.062388 ignition[1021]: Stage: fetch-offline Aug 13 00:55:58.062500 ignition[1021]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:55:58.062541 ignition[1021]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:55:58.079928 ignition[1021]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:55:58.080323 ignition[1021]: Ignition finished successfully Aug 13 00:55:58.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.081152 systemd[1]: Finished ignition-fetch-offline.service. Aug 13 00:55:58.083137 systemd[1]: Starting ignition-fetch.service... Aug 13 00:55:58.091460 ignition[1046]: Ignition 2.14.0 Aug 13 00:55:58.091480 ignition[1046]: Stage: fetch Aug 13 00:55:58.091622 ignition[1046]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:55:58.091642 ignition[1046]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:55:58.097512 ignition[1046]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:55:58.098140 ignition[1046]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:55:58.106421 ignition[1046]: INFO : PUT result: OK Aug 13 00:55:58.108453 ignition[1046]: DEBUG : parsed url from cmdline: "" Aug 13 00:55:58.108453 ignition[1046]: INFO : no config URL provided Aug 13 00:55:58.109679 ignition[1046]: INFO : reading system config file "/usr/lib/ignition/user.ign" Aug 13 00:55:58.109679 ignition[1046]: INFO : no config at "/usr/lib/ignition/user.ign" Aug 13 00:55:58.109679 ignition[1046]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:55:58.111787 ignition[1046]: INFO : PUT result: OK Aug 13 00:55:58.112422 ignition[1046]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Aug 13 00:55:58.113384 ignition[1046]: INFO : GET result: OK Aug 13 00:55:58.113384 ignition[1046]: DEBUG : parsing config with SHA512: b99ec3159653cb33d0e50ca3bc423f4b6caa147a141ac784d33b1d1382f51a792cf5251ebd536ebaeea85e8c7edd510cea361028a92a9f37d0388b9e65142a1d Aug 13 00:55:58.115469 unknown[1046]: fetched base config from "system" Aug 13 00:55:58.115888 ignition[1046]: fetch: fetch complete Aug 13 00:55:58.115477 unknown[1046]: fetched base config from "system" Aug 13 00:55:58.115893 ignition[1046]: fetch: fetch passed Aug 13 00:55:58.115483 unknown[1046]: fetched user config from "aws" Aug 13 00:55:58.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.115933 ignition[1046]: Ignition finished successfully Aug 13 00:55:58.117167 systemd[1]: Finished ignition-fetch.service. Aug 13 00:55:58.118775 systemd[1]: Starting ignition-kargs.service... Aug 13 00:55:58.128536 ignition[1052]: Ignition 2.14.0 Aug 13 00:55:58.128548 ignition[1052]: Stage: kargs Aug 13 00:55:58.128696 ignition[1052]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:55:58.128719 ignition[1052]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:55:58.134178 ignition[1052]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:55:58.135123 ignition[1052]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:55:58.135732 ignition[1052]: INFO : PUT result: OK Aug 13 00:55:58.137326 ignition[1052]: kargs: kargs passed Aug 13 00:55:58.137375 ignition[1052]: Ignition finished successfully Aug 13 00:55:58.138685 systemd[1]: Finished ignition-kargs.service. Aug 13 00:55:58.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.140518 systemd[1]: Starting ignition-disks.service... Aug 13 00:55:58.148714 ignition[1058]: Ignition 2.14.0 Aug 13 00:55:58.148724 ignition[1058]: Stage: disks Aug 13 00:55:58.148871 ignition[1058]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:55:58.148897 ignition[1058]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:55:58.154738 ignition[1058]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:55:58.155378 ignition[1058]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:55:58.156447 ignition[1058]: INFO : PUT result: OK Aug 13 00:55:58.159522 ignition[1058]: disks: disks passed Aug 13 00:55:58.159586 ignition[1058]: Ignition finished successfully Aug 13 00:55:58.161386 systemd[1]: Finished ignition-disks.service. Aug 13 00:55:58.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.162038 systemd[1]: Reached target initrd-root-device.target. Aug 13 00:55:58.162930 systemd[1]: Reached target local-fs-pre.target. Aug 13 00:55:58.163859 systemd[1]: Reached target local-fs.target. Aug 13 00:55:58.165073 systemd[1]: Reached target sysinit.target. Aug 13 00:55:58.165962 systemd[1]: Reached target basic.target. Aug 13 00:55:58.167906 systemd[1]: Starting systemd-fsck-root.service... Aug 13 00:55:58.190307 systemd-fsck[1067]: ROOT: clean, 629/553520 files, 56027/553472 blocks Aug 13 00:55:58.193285 systemd[1]: Finished systemd-fsck-root.service. Aug 13 00:55:58.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.194734 systemd[1]: Mounting sysroot.mount... Aug 13 00:55:58.214211 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Aug 13 00:55:58.214416 systemd[1]: Mounted sysroot.mount. Aug 13 00:55:58.215169 systemd[1]: Reached target initrd-root-fs.target. Aug 13 00:55:58.224828 systemd[1]: Mounting sysroot-usr.mount... Aug 13 00:55:58.226555 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Aug 13 00:55:58.227327 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Aug 13 00:55:58.227354 systemd[1]: Reached target ignition-diskful.target. Aug 13 00:55:58.229088 systemd[1]: Mounted sysroot-usr.mount. Aug 13 00:55:58.232167 systemd[1]: Starting initrd-setup-root.service... Aug 13 00:55:58.244243 initrd-setup-root[1088]: cut: /sysroot/etc/passwd: No such file or directory Aug 13 00:55:58.267249 initrd-setup-root[1096]: cut: /sysroot/etc/group: No such file or directory Aug 13 00:55:58.271854 initrd-setup-root[1104]: cut: /sysroot/etc/shadow: No such file or directory Aug 13 00:55:58.276560 initrd-setup-root[1112]: cut: /sysroot/etc/gshadow: No such file or directory Aug 13 00:55:58.412384 systemd[1]: Mounting sysroot-usr-share-oem.mount... Aug 13 00:55:58.418017 systemd[1]: Finished initrd-setup-root.service. Aug 13 00:55:58.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.420145 systemd[1]: Starting ignition-mount.service... Aug 13 00:55:58.422839 systemd[1]: Starting sysroot-boot.service... Aug 13 00:55:58.427524 bash[1130]: umount: /sysroot/usr/share/oem: not mounted. Aug 13 00:55:58.433446 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1123) Aug 13 00:55:58.436816 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Aug 13 00:55:58.436867 kernel: BTRFS info (device nvme0n1p6): using free space tree Aug 13 00:55:58.436879 kernel: BTRFS info (device nvme0n1p6): has skinny extents Aug 13 00:55:58.437563 ignition[1131]: INFO : Ignition 2.14.0 Aug 13 00:55:58.438764 ignition[1131]: INFO : Stage: mount Aug 13 00:55:58.438764 ignition[1131]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:55:58.438764 ignition[1131]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:55:58.447611 ignition[1131]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:55:58.448617 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:55:58.449900 ignition[1131]: INFO : PUT result: OK Aug 13 00:55:58.453075 ignition[1131]: INFO : mount: mount passed Aug 13 00:55:58.453710 ignition[1131]: INFO : Ignition finished successfully Aug 13 00:55:58.455498 systemd[1]: Finished ignition-mount.service. Aug 13 00:55:58.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.462199 systemd[1]: Finished sysroot-boot.service. Aug 13 00:55:58.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:58.494221 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Aug 13 00:55:58.503957 systemd[1]: Mounted sysroot-usr-share-oem.mount. Aug 13 00:55:58.505525 systemd[1]: Starting ignition-files.service... Aug 13 00:55:58.521288 ignition[1159]: INFO : Ignition 2.14.0 Aug 13 00:55:58.521288 ignition[1159]: INFO : Stage: files Aug 13 00:55:58.522673 ignition[1159]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:55:58.522673 ignition[1159]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:55:58.527775 ignition[1159]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:55:58.528439 ignition[1159]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:55:58.529056 ignition[1159]: INFO : PUT result: OK Aug 13 00:55:58.531639 ignition[1159]: DEBUG : files: compiled without relabeling support, skipping Aug 13 00:55:58.537309 ignition[1159]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Aug 13 00:55:58.537309 ignition[1159]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Aug 13 00:55:58.539983 ignition[1159]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Aug 13 00:55:58.541088 ignition[1159]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Aug 13 00:55:58.541088 ignition[1159]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Aug 13 00:55:58.541067 unknown[1159]: wrote ssh authorized keys file for user: core Aug 13 00:55:58.544167 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Aug 13 00:55:58.544167 ignition[1159]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:55:58.547518 ignition[1159]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1730001080" Aug 13 00:55:58.548777 ignition[1159]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1730001080": device or resource busy Aug 13 00:55:58.548777 ignition[1159]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1730001080", trying btrfs: device or resource busy Aug 13 00:55:58.548777 ignition[1159]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1730001080" Aug 13 00:55:58.552512 ignition[1159]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1730001080" Aug 13 00:55:58.564255 ignition[1159]: INFO : op(3): [started] unmounting "/mnt/oem1730001080" Aug 13 00:55:58.565842 ignition[1159]: INFO : op(3): [finished] unmounting "/mnt/oem1730001080" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:55:58.565842 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Aug 13 00:55:58.565842 ignition[1159]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:55:58.565744 systemd[1]: mnt-oem1730001080.mount: Deactivated successfully. Aug 13 00:55:58.581146 ignition[1159]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem478930467" Aug 13 00:55:58.581146 ignition[1159]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem478930467": device or resource busy Aug 13 00:55:58.581146 ignition[1159]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem478930467", trying btrfs: device or resource busy Aug 13 00:55:58.581146 ignition[1159]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem478930467" Aug 13 00:55:58.581146 ignition[1159]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem478930467" Aug 13 00:55:58.581146 ignition[1159]: INFO : op(6): [started] unmounting "/mnt/oem478930467" Aug 13 00:55:58.581146 ignition[1159]: INFO : op(6): [finished] unmounting "/mnt/oem478930467" Aug 13 00:55:58.581146 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Aug 13 00:55:58.581146 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Aug 13 00:55:58.581146 ignition[1159]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:55:58.581146 ignition[1159]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3140356210" Aug 13 00:55:58.581146 ignition[1159]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3140356210": device or resource busy Aug 13 00:55:58.581146 ignition[1159]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3140356210", trying btrfs: device or resource busy Aug 13 00:55:58.581146 ignition[1159]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3140356210" Aug 13 00:55:58.581146 ignition[1159]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3140356210" Aug 13 00:55:58.581146 ignition[1159]: INFO : op(9): [started] unmounting "/mnt/oem3140356210" Aug 13 00:55:58.581146 ignition[1159]: INFO : op(9): [finished] unmounting "/mnt/oem3140356210" Aug 13 00:55:58.581146 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Aug 13 00:55:58.581146 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Aug 13 00:55:58.581146 ignition[1159]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:55:58.606036 ignition[1159]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279276095" Aug 13 00:55:58.606036 ignition[1159]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279276095": device or resource busy Aug 13 00:55:58.606036 ignition[1159]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1279276095", trying btrfs: device or resource busy Aug 13 00:55:58.606036 ignition[1159]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279276095" Aug 13 00:55:58.606036 ignition[1159]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279276095" Aug 13 00:55:58.606036 ignition[1159]: INFO : op(c): [started] unmounting "/mnt/oem1279276095" Aug 13 00:55:58.606036 ignition[1159]: INFO : op(c): [finished] unmounting "/mnt/oem1279276095" Aug 13 00:55:58.606036 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Aug 13 00:55:58.606036 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:55:58.606036 ignition[1159]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Aug 13 00:55:59.025746 ignition[1159]: INFO : GET result: OK Aug 13 00:55:59.276415 systemd-networkd[1022]: eth0: Gained IPv6LL Aug 13 00:55:59.382111 ignition[1159]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:55:59.382111 ignition[1159]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Aug 13 00:55:59.382111 ignition[1159]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Aug 13 00:55:59.382111 ignition[1159]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(e): [started] processing unit "nvidia.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(e): [finished] processing unit "nvidia.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(f): [started] setting preset to enabled for "nvidia.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(f): [finished] setting preset to enabled for "nvidia.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(10): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(10): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(11): [started] setting preset to enabled for "amazon-ssm-agent.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: op(11): [finished] setting preset to enabled for "amazon-ssm-agent.service" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Aug 13 00:55:59.387724 ignition[1159]: INFO : files: files passed Aug 13 00:55:59.387724 ignition[1159]: INFO : Ignition finished successfully Aug 13 00:55:59.433750 kernel: kauditd_printk_skb: 26 callbacks suppressed Aug 13 00:55:59.433784 kernel: audit: type=1130 audit(1755046559.391:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.433798 kernel: audit: type=1130 audit(1755046559.408:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.433810 kernel: audit: type=1131 audit(1755046559.408:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.433821 kernel: audit: type=1130 audit(1755046559.420:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.391450 systemd[1]: Finished ignition-files.service. Aug 13 00:55:59.398312 systemd[1]: Starting initrd-setup-root-after-ignition.service... Aug 13 00:55:59.435783 initrd-setup-root-after-ignition[1184]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Aug 13 00:55:59.403287 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Aug 13 00:55:59.404084 systemd[1]: Starting ignition-quench.service... Aug 13 00:55:59.408149 systemd[1]: ignition-quench.service: Deactivated successfully. Aug 13 00:55:59.408273 systemd[1]: Finished ignition-quench.service. Aug 13 00:55:59.420396 systemd[1]: Finished initrd-setup-root-after-ignition.service. Aug 13 00:55:59.421505 systemd[1]: Reached target ignition-complete.target. Aug 13 00:55:59.429664 systemd[1]: Starting initrd-parse-etc.service... Aug 13 00:55:59.447737 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Aug 13 00:55:59.447858 systemd[1]: Finished initrd-parse-etc.service. Aug 13 00:55:59.459620 kernel: audit: type=1130 audit(1755046559.447:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.459656 kernel: audit: type=1131 audit(1755046559.447:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.449316 systemd[1]: Reached target initrd-fs.target. Aug 13 00:55:59.460284 systemd[1]: Reached target initrd.target. Aug 13 00:55:59.461670 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Aug 13 00:55:59.462680 systemd[1]: Starting dracut-pre-pivot.service... Aug 13 00:55:59.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.474769 systemd[1]: Finished dracut-pre-pivot.service. Aug 13 00:55:59.481276 kernel: audit: type=1130 audit(1755046559.474:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.481476 systemd[1]: Starting initrd-cleanup.service... Aug 13 00:55:59.491111 systemd[1]: Stopped target nss-lookup.target. Aug 13 00:55:59.492631 systemd[1]: Stopped target remote-cryptsetup.target. Aug 13 00:55:59.493979 systemd[1]: Stopped target timers.target. Aug 13 00:55:59.495470 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Aug 13 00:55:59.495598 systemd[1]: Stopped dracut-pre-pivot.service. Aug 13 00:55:59.501980 kernel: audit: type=1131 audit(1755046559.495:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.496906 systemd[1]: Stopped target initrd.target. Aug 13 00:55:59.502783 systemd[1]: Stopped target basic.target. Aug 13 00:55:59.503976 systemd[1]: Stopped target ignition-complete.target. Aug 13 00:55:59.505078 systemd[1]: Stopped target ignition-diskful.target. Aug 13 00:55:59.506328 systemd[1]: Stopped target initrd-root-device.target. Aug 13 00:55:59.507715 systemd[1]: Stopped target remote-fs.target. Aug 13 00:55:59.508941 systemd[1]: Stopped target remote-fs-pre.target. Aug 13 00:55:59.510166 systemd[1]: Stopped target sysinit.target. Aug 13 00:55:59.511534 systemd[1]: Stopped target local-fs.target. Aug 13 00:55:59.512740 systemd[1]: Stopped target local-fs-pre.target. Aug 13 00:55:59.513921 systemd[1]: Stopped target swap.target. Aug 13 00:55:59.515137 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Aug 13 00:55:59.521573 kernel: audit: type=1131 audit(1755046559.515:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.515365 systemd[1]: Stopped dracut-pre-mount.service. Aug 13 00:55:59.516575 systemd[1]: Stopped target cryptsetup.target. Aug 13 00:55:59.529016 kernel: audit: type=1131 audit(1755046559.522:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.522374 systemd[1]: dracut-initqueue.service: Deactivated successfully. Aug 13 00:55:59.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.522672 systemd[1]: Stopped dracut-initqueue.service. Aug 13 00:55:59.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.523936 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Aug 13 00:55:59.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.543923 iscsid[1027]: iscsid shutting down. Aug 13 00:55:59.524142 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Aug 13 00:55:59.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.529931 systemd[1]: ignition-files.service: Deactivated successfully. Aug 13 00:55:59.551860 ignition[1197]: INFO : Ignition 2.14.0 Aug 13 00:55:59.551860 ignition[1197]: INFO : Stage: umount Aug 13 00:55:59.551860 ignition[1197]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:55:59.551860 ignition[1197]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:55:59.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.530132 systemd[1]: Stopped ignition-files.service. Aug 13 00:55:59.532592 systemd[1]: Stopping ignition-mount.service... Aug 13 00:55:59.534171 systemd[1]: Stopping iscsid.service... Aug 13 00:55:59.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.540822 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Aug 13 00:55:59.541116 systemd[1]: Stopped kmod-static-nodes.service. Aug 13 00:55:59.545297 systemd[1]: Stopping sysroot-boot.service... Aug 13 00:55:59.546467 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Aug 13 00:55:59.546747 systemd[1]: Stopped systemd-udev-trigger.service. Aug 13 00:55:59.549383 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Aug 13 00:55:59.550823 systemd[1]: Stopped dracut-pre-trigger.service. Aug 13 00:55:59.557166 systemd[1]: iscsid.service: Deactivated successfully. Aug 13 00:55:59.557313 systemd[1]: Stopped iscsid.service. Aug 13 00:55:59.561881 systemd[1]: initrd-cleanup.service: Deactivated successfully. Aug 13 00:55:59.561995 systemd[1]: Finished initrd-cleanup.service. Aug 13 00:55:59.566624 systemd[1]: Stopping iscsiuio.service... Aug 13 00:55:59.571332 systemd[1]: iscsiuio.service: Deactivated successfully. Aug 13 00:55:59.587528 ignition[1197]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:55:59.587528 ignition[1197]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:55:59.571458 systemd[1]: Stopped iscsiuio.service. Aug 13 00:55:59.582530 systemd[1]: sysroot-boot.mount: Deactivated successfully. Aug 13 00:55:59.591010 ignition[1197]: INFO : PUT result: OK Aug 13 00:55:59.592140 ignition[1197]: INFO : umount: umount passed Aug 13 00:55:59.593023 ignition[1197]: INFO : Ignition finished successfully Aug 13 00:55:59.593675 systemd[1]: ignition-mount.service: Deactivated successfully. Aug 13 00:55:59.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.593819 systemd[1]: Stopped ignition-mount.service. Aug 13 00:55:59.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.594706 systemd[1]: ignition-disks.service: Deactivated successfully. Aug 13 00:55:59.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.594777 systemd[1]: Stopped ignition-disks.service. Aug 13 00:55:59.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.595808 systemd[1]: ignition-kargs.service: Deactivated successfully. Aug 13 00:55:59.595866 systemd[1]: Stopped ignition-kargs.service. Aug 13 00:55:59.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.596900 systemd[1]: ignition-fetch.service: Deactivated successfully. Aug 13 00:55:59.596953 systemd[1]: Stopped ignition-fetch.service. Aug 13 00:55:59.598006 systemd[1]: Stopped target network.target. Aug 13 00:55:59.599124 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Aug 13 00:55:59.599183 systemd[1]: Stopped ignition-fetch-offline.service. Aug 13 00:55:59.600244 systemd[1]: Stopped target paths.target. Aug 13 00:55:59.601261 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Aug 13 00:55:59.605725 systemd[1]: Stopped systemd-ask-password-console.path. Aug 13 00:55:59.606332 systemd[1]: Stopped target slices.target. Aug 13 00:55:59.607503 systemd[1]: Stopped target sockets.target. Aug 13 00:55:59.608563 systemd[1]: iscsid.socket: Deactivated successfully. Aug 13 00:55:59.608640 systemd[1]: Closed iscsid.socket. Aug 13 00:55:59.610079 systemd[1]: iscsiuio.socket: Deactivated successfully. Aug 13 00:55:59.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.610129 systemd[1]: Closed iscsiuio.socket. Aug 13 00:55:59.611261 systemd[1]: ignition-setup.service: Deactivated successfully. Aug 13 00:55:59.611329 systemd[1]: Stopped ignition-setup.service. Aug 13 00:55:59.612631 systemd[1]: Stopping systemd-networkd.service... Aug 13 00:55:59.613697 systemd[1]: Stopping systemd-resolved.service... Aug 13 00:55:59.617267 systemd-networkd[1022]: eth0: DHCPv6 lease lost Aug 13 00:55:59.618906 systemd[1]: systemd-resolved.service: Deactivated successfully. Aug 13 00:55:59.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.619054 systemd[1]: Stopped systemd-resolved.service. Aug 13 00:55:59.620492 systemd[1]: systemd-networkd.service: Deactivated successfully. Aug 13 00:55:59.620629 systemd[1]: Stopped systemd-networkd.service. Aug 13 00:55:59.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.622000 audit: BPF prog-id=6 op=UNLOAD Aug 13 00:55:59.623713 systemd[1]: systemd-networkd.socket: Deactivated successfully. Aug 13 00:55:59.623000 audit: BPF prog-id=9 op=UNLOAD Aug 13 00:55:59.624428 systemd[1]: Closed systemd-networkd.socket. Aug 13 00:55:59.626395 systemd[1]: Stopping network-cleanup.service... Aug 13 00:55:59.628296 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Aug 13 00:55:59.628901 systemd[1]: Stopped parse-ip-for-networkd.service. Aug 13 00:55:59.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.630083 systemd[1]: systemd-sysctl.service: Deactivated successfully. Aug 13 00:55:59.630151 systemd[1]: Stopped systemd-sysctl.service. Aug 13 00:55:59.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.632169 systemd[1]: systemd-modules-load.service: Deactivated successfully. Aug 13 00:55:59.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.632279 systemd[1]: Stopped systemd-modules-load.service. Aug 13 00:55:59.635719 systemd[1]: Stopping systemd-udevd.service... Aug 13 00:55:59.639691 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Aug 13 00:55:59.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.644171 systemd[1]: network-cleanup.service: Deactivated successfully. Aug 13 00:55:59.644357 systemd[1]: Stopped network-cleanup.service. Aug 13 00:55:59.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.646302 systemd[1]: systemd-udevd.service: Deactivated successfully. Aug 13 00:55:59.646436 systemd[1]: Stopped systemd-udevd.service. Aug 13 00:55:59.647850 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Aug 13 00:55:59.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.647901 systemd[1]: Closed systemd-udevd-control.socket. Aug 13 00:55:59.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.648810 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Aug 13 00:55:59.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.648855 systemd[1]: Closed systemd-udevd-kernel.socket. Aug 13 00:55:59.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.649953 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Aug 13 00:55:59.650027 systemd[1]: Stopped dracut-pre-udev.service. Aug 13 00:55:59.651268 systemd[1]: dracut-cmdline.service: Deactivated successfully. Aug 13 00:55:59.651338 systemd[1]: Stopped dracut-cmdline.service. Aug 13 00:55:59.652451 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Aug 13 00:55:59.652504 systemd[1]: Stopped dracut-cmdline-ask.service. Aug 13 00:55:59.654840 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Aug 13 00:55:59.657228 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Aug 13 00:55:59.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.657302 systemd[1]: Stopped systemd-vconsole-setup.service. Aug 13 00:55:59.665265 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Aug 13 00:55:59.665386 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Aug 13 00:55:59.711802 systemd[1]: sysroot-boot.service: Deactivated successfully. Aug 13 00:55:59.711911 systemd[1]: Stopped sysroot-boot.service. Aug 13 00:55:59.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.713278 systemd[1]: Reached target initrd-switch-root.target. Aug 13 00:55:59.714237 systemd[1]: initrd-setup-root.service: Deactivated successfully. Aug 13 00:55:59.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:55:59.714298 systemd[1]: Stopped initrd-setup-root.service. Aug 13 00:55:59.716255 systemd[1]: Starting initrd-switch-root.service... Aug 13 00:55:59.728538 systemd[1]: Switching root. Aug 13 00:55:59.759807 systemd-journald[185]: Journal stopped Aug 13 00:56:05.260809 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Aug 13 00:56:05.260898 kernel: SELinux: Class mctp_socket not defined in policy. Aug 13 00:56:05.260924 kernel: SELinux: Class anon_inode not defined in policy. Aug 13 00:56:05.260942 kernel: SELinux: the above unknown classes and permissions will be allowed Aug 13 00:56:05.260964 kernel: SELinux: policy capability network_peer_controls=1 Aug 13 00:56:05.260981 kernel: SELinux: policy capability open_perms=1 Aug 13 00:56:05.261002 kernel: SELinux: policy capability extended_socket_class=1 Aug 13 00:56:05.261020 kernel: SELinux: policy capability always_check_network=0 Aug 13 00:56:05.261037 kernel: SELinux: policy capability cgroup_seclabel=1 Aug 13 00:56:05.261058 kernel: SELinux: policy capability nnp_nosuid_transition=1 Aug 13 00:56:05.261075 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Aug 13 00:56:05.261092 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Aug 13 00:56:05.261117 systemd[1]: Successfully loaded SELinux policy in 105.729ms. Aug 13 00:56:05.261147 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.893ms. Aug 13 00:56:05.261167 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 00:56:05.261210 systemd[1]: Detected virtualization amazon. Aug 13 00:56:05.261229 systemd[1]: Detected architecture x86-64. Aug 13 00:56:05.261246 systemd[1]: Detected first boot. Aug 13 00:56:05.261265 systemd[1]: Initializing machine ID from VM UUID. Aug 13 00:56:05.261283 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Aug 13 00:56:05.261302 systemd[1]: Populated /etc with preset unit settings. Aug 13 00:56:05.261321 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:56:05.261341 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:56:05.261364 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:56:05.261383 kernel: kauditd_printk_skb: 48 callbacks suppressed Aug 13 00:56:05.261400 kernel: audit: type=1334 audit(1755046564.966:88): prog-id=12 op=LOAD Aug 13 00:56:05.261418 kernel: audit: type=1334 audit(1755046564.966:89): prog-id=3 op=UNLOAD Aug 13 00:56:05.261435 kernel: audit: type=1334 audit(1755046564.968:90): prog-id=13 op=LOAD Aug 13 00:56:05.261453 kernel: audit: type=1334 audit(1755046564.970:91): prog-id=14 op=LOAD Aug 13 00:56:05.261472 kernel: audit: type=1334 audit(1755046564.970:92): prog-id=4 op=UNLOAD Aug 13 00:56:05.261489 kernel: audit: type=1334 audit(1755046564.970:93): prog-id=5 op=UNLOAD Aug 13 00:56:05.261508 kernel: audit: type=1131 audit(1755046564.971:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.261525 systemd[1]: initrd-switch-root.service: Deactivated successfully. Aug 13 00:56:05.261547 systemd[1]: Stopped initrd-switch-root.service. Aug 13 00:56:05.261566 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Aug 13 00:56:05.261583 kernel: audit: type=1334 audit(1755046564.989:95): prog-id=12 op=UNLOAD Aug 13 00:56:05.261605 systemd[1]: Created slice system-addon\x2dconfig.slice. Aug 13 00:56:05.261627 kernel: audit: type=1130 audit(1755046564.990:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.261644 kernel: audit: type=1131 audit(1755046564.990:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.261663 systemd[1]: Created slice system-addon\x2drun.slice. Aug 13 00:56:05.261682 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Aug 13 00:56:05.261700 systemd[1]: Created slice system-getty.slice. Aug 13 00:56:05.261718 systemd[1]: Created slice system-modprobe.slice. Aug 13 00:56:05.261736 systemd[1]: Created slice system-serial\x2dgetty.slice. Aug 13 00:56:05.261757 systemd[1]: Created slice system-system\x2dcloudinit.slice. Aug 13 00:56:05.261775 systemd[1]: Created slice system-systemd\x2dfsck.slice. Aug 13 00:56:05.261794 systemd[1]: Created slice user.slice. Aug 13 00:56:05.261812 systemd[1]: Started systemd-ask-password-console.path. Aug 13 00:56:05.261830 systemd[1]: Started systemd-ask-password-wall.path. Aug 13 00:56:05.261849 systemd[1]: Set up automount boot.automount. Aug 13 00:56:05.261866 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Aug 13 00:56:05.261884 systemd[1]: Stopped target initrd-switch-root.target. Aug 13 00:56:05.261902 systemd[1]: Stopped target initrd-fs.target. Aug 13 00:56:05.261925 systemd[1]: Stopped target initrd-root-fs.target. Aug 13 00:56:05.261944 systemd[1]: Reached target integritysetup.target. Aug 13 00:56:05.261963 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 00:56:05.261980 systemd[1]: Reached target remote-fs.target. Aug 13 00:56:05.261998 systemd[1]: Reached target slices.target. Aug 13 00:56:05.262017 systemd[1]: Reached target swap.target. Aug 13 00:56:05.263521 systemd[1]: Reached target torcx.target. Aug 13 00:56:05.263548 systemd[1]: Reached target veritysetup.target. Aug 13 00:56:05.263571 systemd[1]: Listening on systemd-coredump.socket. Aug 13 00:56:05.263593 systemd[1]: Listening on systemd-initctl.socket. Aug 13 00:56:05.263622 systemd[1]: Listening on systemd-networkd.socket. Aug 13 00:56:05.263644 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 00:56:05.263667 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 00:56:05.263690 systemd[1]: Listening on systemd-userdbd.socket. Aug 13 00:56:05.263713 systemd[1]: Mounting dev-hugepages.mount... Aug 13 00:56:05.263735 systemd[1]: Mounting dev-mqueue.mount... Aug 13 00:56:05.263759 systemd[1]: Mounting media.mount... Aug 13 00:56:05.263781 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:56:05.263802 systemd[1]: Mounting sys-kernel-debug.mount... Aug 13 00:56:05.263830 systemd[1]: Mounting sys-kernel-tracing.mount... Aug 13 00:56:05.263853 systemd[1]: Mounting tmp.mount... Aug 13 00:56:05.263875 systemd[1]: Starting flatcar-tmpfiles.service... Aug 13 00:56:05.263899 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:56:05.263922 systemd[1]: Starting kmod-static-nodes.service... Aug 13 00:56:05.263945 systemd[1]: Starting modprobe@configfs.service... Aug 13 00:56:05.263967 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:56:05.263990 systemd[1]: Starting modprobe@drm.service... Aug 13 00:56:05.264017 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:56:05.264052 systemd[1]: Starting modprobe@fuse.service... Aug 13 00:56:05.264078 systemd[1]: Starting modprobe@loop.service... Aug 13 00:56:05.264101 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Aug 13 00:56:05.264125 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Aug 13 00:56:05.264153 systemd[1]: Stopped systemd-fsck-root.service. Aug 13 00:56:05.264176 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Aug 13 00:56:05.264321 systemd[1]: Stopped systemd-fsck-usr.service. Aug 13 00:56:05.264345 systemd[1]: Stopped systemd-journald.service. Aug 13 00:56:05.264369 systemd[1]: Starting systemd-journald.service... Aug 13 00:56:05.264392 kernel: fuse: init (API version 7.34) Aug 13 00:56:05.264416 systemd[1]: Starting systemd-modules-load.service... Aug 13 00:56:05.264438 systemd[1]: Starting systemd-network-generator.service... Aug 13 00:56:05.264461 systemd[1]: Starting systemd-remount-fs.service... Aug 13 00:56:05.264485 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 00:56:05.264512 kernel: loop: module loaded Aug 13 00:56:05.264535 systemd[1]: verity-setup.service: Deactivated successfully. Aug 13 00:56:05.264557 systemd[1]: Stopped verity-setup.service. Aug 13 00:56:05.264582 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:56:05.264604 systemd[1]: Mounted dev-hugepages.mount. Aug 13 00:56:05.264628 systemd[1]: Mounted dev-mqueue.mount. Aug 13 00:56:05.264656 systemd[1]: Mounted media.mount. Aug 13 00:56:05.264678 systemd[1]: Mounted sys-kernel-debug.mount. Aug 13 00:56:05.264703 systemd[1]: Mounted sys-kernel-tracing.mount. Aug 13 00:56:05.264729 systemd[1]: Mounted tmp.mount. Aug 13 00:56:05.264753 systemd[1]: Finished flatcar-tmpfiles.service. Aug 13 00:56:05.264783 systemd-journald[1313]: Journal started Aug 13 00:56:05.264869 systemd-journald[1313]: Runtime Journal (/run/log/journal/ec26d435b2f4743c6c5e2c6bc3673b5e) is 4.8M, max 38.3M, 33.5M free. Aug 13 00:56:00.438000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Aug 13 00:56:00.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:56:00.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:56:00.619000 audit: BPF prog-id=10 op=LOAD Aug 13 00:56:00.619000 audit: BPF prog-id=10 op=UNLOAD Aug 13 00:56:00.619000 audit: BPF prog-id=11 op=LOAD Aug 13 00:56:00.619000 audit: BPF prog-id=11 op=UNLOAD Aug 13 00:56:00.845000 audit[1230]: AVC avc: denied { associate } for pid=1230 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Aug 13 00:56:00.845000 audit[1230]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1213 pid=1230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:00.845000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 00:56:00.847000 audit[1230]: AVC avc: denied { associate } for pid=1230 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Aug 13 00:56:00.847000 audit[1230]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179c9 a2=1ed a3=0 items=2 ppid=1213 pid=1230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:00.847000 audit: CWD cwd="/" Aug 13 00:56:00.847000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:00.847000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:00.847000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 00:56:04.966000 audit: BPF prog-id=12 op=LOAD Aug 13 00:56:04.966000 audit: BPF prog-id=3 op=UNLOAD Aug 13 00:56:04.968000 audit: BPF prog-id=13 op=LOAD Aug 13 00:56:04.970000 audit: BPF prog-id=14 op=LOAD Aug 13 00:56:04.970000 audit: BPF prog-id=4 op=UNLOAD Aug 13 00:56:04.970000 audit: BPF prog-id=5 op=UNLOAD Aug 13 00:56:04.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:04.989000 audit: BPF prog-id=12 op=UNLOAD Aug 13 00:56:04.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:04.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.167000 audit: BPF prog-id=15 op=LOAD Aug 13 00:56:05.167000 audit: BPF prog-id=16 op=LOAD Aug 13 00:56:05.167000 audit: BPF prog-id=17 op=LOAD Aug 13 00:56:05.167000 audit: BPF prog-id=13 op=UNLOAD Aug 13 00:56:05.167000 audit: BPF prog-id=14 op=UNLOAD Aug 13 00:56:05.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.257000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Aug 13 00:56:05.257000 audit[1313]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe6ae112f0 a2=4000 a3=7ffe6ae1138c items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:05.257000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Aug 13 00:56:05.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.841556 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:56:04.965686 systemd[1]: Queued start job for default target multi-user.target. Aug 13 00:56:00.842702 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 00:56:04.965699 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Aug 13 00:56:00.842725 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 00:56:04.972611 systemd[1]: systemd-journald.service: Deactivated successfully. Aug 13 00:56:00.842758 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Aug 13 00:56:00.842768 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Aug 13 00:56:00.842799 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Aug 13 00:56:00.842811 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Aug 13 00:56:00.843001 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Aug 13 00:56:00.843038 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 00:56:00.843050 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 00:56:00.845247 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Aug 13 00:56:00.845289 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Aug 13 00:56:00.845310 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Aug 13 00:56:00.845325 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Aug 13 00:56:00.845344 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Aug 13 00:56:00.845358 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Aug 13 00:56:04.409865 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:56:05.269225 systemd[1]: Finished kmod-static-nodes.service. Aug 13 00:56:04.410125 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:56:04.410258 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:56:04.410449 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:56:04.410498 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Aug 13 00:56:04.410637 /usr/lib/systemd/system-generators/torcx-generator[1230]: time="2025-08-13T00:56:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Aug 13 00:56:05.274734 systemd[1]: Started systemd-journald.service. Aug 13 00:56:05.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.274613 systemd[1]: modprobe@configfs.service: Deactivated successfully. Aug 13 00:56:05.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.275202 systemd[1]: Finished modprobe@configfs.service. Aug 13 00:56:05.276688 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:56:05.276896 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:56:05.278713 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 00:56:05.278935 systemd[1]: Finished modprobe@drm.service. Aug 13 00:56:05.280431 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:56:05.280663 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:56:05.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.282957 systemd[1]: modprobe@fuse.service: Deactivated successfully. Aug 13 00:56:05.283168 systemd[1]: Finished modprobe@fuse.service. Aug 13 00:56:05.284607 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:56:05.284811 systemd[1]: Finished modprobe@loop.service. Aug 13 00:56:05.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.286857 systemd[1]: Finished systemd-modules-load.service. Aug 13 00:56:05.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.288551 systemd[1]: Finished systemd-network-generator.service. Aug 13 00:56:05.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.290163 systemd[1]: Finished systemd-remount-fs.service. Aug 13 00:56:05.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.292257 systemd[1]: Reached target network-pre.target. Aug 13 00:56:05.295148 systemd[1]: Mounting sys-fs-fuse-connections.mount... Aug 13 00:56:05.301910 systemd[1]: Mounting sys-kernel-config.mount... Aug 13 00:56:05.303007 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Aug 13 00:56:05.309416 systemd[1]: Starting systemd-hwdb-update.service... Aug 13 00:56:05.311951 systemd[1]: Starting systemd-journal-flush.service... Aug 13 00:56:05.313287 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:56:05.315117 systemd[1]: Starting systemd-random-seed.service... Aug 13 00:56:05.316653 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:56:05.318693 systemd[1]: Starting systemd-sysctl.service... Aug 13 00:56:05.323427 systemd[1]: Starting systemd-sysusers.service... Aug 13 00:56:05.328709 systemd[1]: Mounted sys-fs-fuse-connections.mount. Aug 13 00:56:05.332227 systemd[1]: Mounted sys-kernel-config.mount. Aug 13 00:56:05.338381 systemd-journald[1313]: Time spent on flushing to /var/log/journal/ec26d435b2f4743c6c5e2c6bc3673b5e is 52.446ms for 1193 entries. Aug 13 00:56:05.338381 systemd-journald[1313]: System Journal (/var/log/journal/ec26d435b2f4743c6c5e2c6bc3673b5e) is 8.0M, max 195.6M, 187.6M free. Aug 13 00:56:05.406024 systemd-journald[1313]: Received client request to flush runtime journal. Aug 13 00:56:05.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.352366 systemd[1]: Finished systemd-random-seed.service. Aug 13 00:56:05.409727 udevadm[1350]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Aug 13 00:56:05.353258 systemd[1]: Reached target first-boot-complete.target. Aug 13 00:56:05.364044 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 00:56:05.365100 systemd[1]: Finished systemd-sysctl.service. Aug 13 00:56:05.367403 systemd[1]: Starting systemd-udev-settle.service... Aug 13 00:56:05.407606 systemd[1]: Finished systemd-journal-flush.service. Aug 13 00:56:05.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.468897 systemd[1]: Finished systemd-sysusers.service. Aug 13 00:56:05.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:05.928667 systemd[1]: Finished systemd-hwdb-update.service. Aug 13 00:56:05.928000 audit: BPF prog-id=18 op=LOAD Aug 13 00:56:05.928000 audit: BPF prog-id=19 op=LOAD Aug 13 00:56:05.928000 audit: BPF prog-id=7 op=UNLOAD Aug 13 00:56:05.928000 audit: BPF prog-id=8 op=UNLOAD Aug 13 00:56:05.930439 systemd[1]: Starting systemd-udevd.service... Aug 13 00:56:05.947850 systemd-udevd[1352]: Using default interface naming scheme 'v252'. Aug 13 00:56:06.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.012000 audit: BPF prog-id=20 op=LOAD Aug 13 00:56:06.011791 systemd[1]: Started systemd-udevd.service. Aug 13 00:56:06.013968 systemd[1]: Starting systemd-networkd.service... Aug 13 00:56:06.040862 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Aug 13 00:56:06.042000 audit: BPF prog-id=21 op=LOAD Aug 13 00:56:06.042000 audit: BPF prog-id=22 op=LOAD Aug 13 00:56:06.042000 audit: BPF prog-id=23 op=LOAD Aug 13 00:56:06.044682 systemd[1]: Starting systemd-userdbd.service... Aug 13 00:56:06.075313 (udev-worker)[1362]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:56:06.079220 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Aug 13 00:56:06.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.088518 systemd[1]: Started systemd-userdbd.service. Aug 13 00:56:06.096316 kernel: ACPI: button: Power Button [PWRF] Aug 13 00:56:06.096412 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Aug 13 00:56:06.097527 kernel: ACPI: button: Sleep Button [SLPF] Aug 13 00:56:06.144000 audit[1359]: AVC avc: denied { confidentiality } for pid=1359 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Aug 13 00:56:06.144000 audit[1359]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ab31d468a0 a1=338ac a2=7f78889c0bc5 a3=5 items=110 ppid=1352 pid=1359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:06.144000 audit: CWD cwd="/" Aug 13 00:56:06.144000 audit: PATH item=0 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=1 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=2 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=3 name=(null) inode=14430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=4 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=5 name=(null) inode=14431 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=6 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=7 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=8 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=9 name=(null) inode=14433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=10 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=11 name=(null) inode=14434 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=12 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=13 name=(null) inode=14435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=14 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=15 name=(null) inode=14436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=16 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=17 name=(null) inode=14437 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=18 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=19 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=20 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=21 name=(null) inode=14439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=22 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=23 name=(null) inode=14440 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=24 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=25 name=(null) inode=14441 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=26 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=27 name=(null) inode=14442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=28 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=29 name=(null) inode=14443 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=30 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=31 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=32 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=33 name=(null) inode=14445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=34 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=35 name=(null) inode=14446 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=36 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=37 name=(null) inode=14447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=38 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=39 name=(null) inode=14448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=40 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=41 name=(null) inode=14449 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=42 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=43 name=(null) inode=14450 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=44 name=(null) inode=14450 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=45 name=(null) inode=14451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=46 name=(null) inode=14450 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=47 name=(null) inode=14452 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=48 name=(null) inode=14450 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=49 name=(null) inode=14453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=50 name=(null) inode=14450 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=51 name=(null) inode=14454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=52 name=(null) inode=14450 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=53 name=(null) inode=14455 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=54 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=55 name=(null) inode=14456 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=56 name=(null) inode=14456 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=57 name=(null) inode=14457 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=58 name=(null) inode=14456 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=59 name=(null) inode=14458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=60 name=(null) inode=14456 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=61 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=62 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=63 name=(null) inode=14460 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=64 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=65 name=(null) inode=14461 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=66 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=67 name=(null) inode=14462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=68 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=69 name=(null) inode=14463 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=70 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=71 name=(null) inode=14464 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=72 name=(null) inode=14456 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=73 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=74 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=75 name=(null) inode=14466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=76 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=77 name=(null) inode=14467 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=78 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=79 name=(null) inode=14468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=80 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=81 name=(null) inode=14469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=82 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=83 name=(null) inode=14470 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=84 name=(null) inode=14456 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=85 name=(null) inode=14471 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=86 name=(null) inode=14471 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=87 name=(null) inode=14472 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=88 name=(null) inode=14471 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=89 name=(null) inode=14473 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=90 name=(null) inode=14471 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=91 name=(null) inode=14474 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=92 name=(null) inode=14471 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=93 name=(null) inode=14475 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=94 name=(null) inode=14471 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=95 name=(null) inode=14476 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=96 name=(null) inode=14456 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=97 name=(null) inode=14477 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=98 name=(null) inode=14477 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=99 name=(null) inode=14478 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=100 name=(null) inode=14477 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=101 name=(null) inode=14479 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=102 name=(null) inode=14477 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=103 name=(null) inode=14480 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=104 name=(null) inode=14477 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=105 name=(null) inode=14481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=106 name=(null) inode=14477 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=107 name=(null) inode=14482 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PATH item=109 name=(null) inode=14483 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:06.144000 audit: PROCTITLE proctitle="(udev-worker)" Aug 13 00:56:06.177283 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Aug 13 00:56:06.180613 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Aug 13 00:56:06.179591 systemd-networkd[1360]: lo: Link UP Aug 13 00:56:06.179596 systemd-networkd[1360]: lo: Gained carrier Aug 13 00:56:06.180027 systemd-networkd[1360]: Enumeration completed Aug 13 00:56:06.180124 systemd[1]: Started systemd-networkd.service. Aug 13 00:56:06.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.180232 systemd-networkd[1360]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 00:56:06.182165 systemd[1]: Starting systemd-networkd-wait-online.service... Aug 13 00:56:06.186937 systemd-networkd[1360]: eth0: Link UP Aug 13 00:56:06.187204 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:56:06.187290 systemd-networkd[1360]: eth0: Gained carrier Aug 13 00:56:06.196220 kernel: mousedev: PS/2 mouse device common for all mice Aug 13 00:56:06.198373 systemd-networkd[1360]: eth0: DHCPv4 address 172.31.31.30/20, gateway 172.31.16.1 acquired from 172.31.16.1 Aug 13 00:56:06.280067 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 00:56:06.280866 systemd[1]: Finished systemd-udev-settle.service. Aug 13 00:56:06.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.282675 systemd[1]: Starting lvm2-activation-early.service... Aug 13 00:56:06.344693 lvm[1466]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 00:56:06.372511 systemd[1]: Finished lvm2-activation-early.service. Aug 13 00:56:06.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.373253 systemd[1]: Reached target cryptsetup.target. Aug 13 00:56:06.375108 systemd[1]: Starting lvm2-activation.service... Aug 13 00:56:06.380058 lvm[1467]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 00:56:06.405563 systemd[1]: Finished lvm2-activation.service. Aug 13 00:56:06.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.406217 systemd[1]: Reached target local-fs-pre.target. Aug 13 00:56:06.406792 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Aug 13 00:56:06.406823 systemd[1]: Reached target local-fs.target. Aug 13 00:56:06.407283 systemd[1]: Reached target machines.target. Aug 13 00:56:06.408884 systemd[1]: Starting ldconfig.service... Aug 13 00:56:06.410184 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:56:06.410264 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:56:06.411456 systemd[1]: Starting systemd-boot-update.service... Aug 13 00:56:06.412877 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Aug 13 00:56:06.416374 systemd[1]: Starting systemd-machine-id-commit.service... Aug 13 00:56:06.417876 systemd[1]: Starting systemd-sysext.service... Aug 13 00:56:06.419496 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1469 (bootctl) Aug 13 00:56:06.420648 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Aug 13 00:56:06.437482 systemd[1]: Unmounting usr-share-oem.mount... Aug 13 00:56:06.444952 systemd[1]: usr-share-oem.mount: Deactivated successfully. Aug 13 00:56:06.445229 systemd[1]: Unmounted usr-share-oem.mount. Aug 13 00:56:06.461224 kernel: loop0: detected capacity change from 0 to 224512 Aug 13 00:56:06.469587 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Aug 13 00:56:06.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.599457 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Aug 13 00:56:06.610251 systemd-fsck[1479]: fsck.fat 4.2 (2021-01-31) Aug 13 00:56:06.610251 systemd-fsck[1479]: /dev/nvme0n1p1: 789 files, 119324/258078 clusters Aug 13 00:56:06.616134 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Aug 13 00:56:06.620260 kernel: loop1: detected capacity change from 0 to 224512 Aug 13 00:56:06.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.618729 systemd[1]: Mounting boot.mount... Aug 13 00:56:06.622080 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Aug 13 00:56:06.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.622845 systemd[1]: Finished systemd-machine-id-commit.service. Aug 13 00:56:06.635338 systemd[1]: Mounted boot.mount. Aug 13 00:56:06.644018 (sd-sysext)[1482]: Using extensions 'kubernetes'. Aug 13 00:56:06.644920 (sd-sysext)[1482]: Merged extensions into '/usr'. Aug 13 00:56:06.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.663471 systemd[1]: Finished systemd-boot-update.service. Aug 13 00:56:06.677007 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:56:06.679012 systemd[1]: Mounting usr-share-oem.mount... Aug 13 00:56:06.680421 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:56:06.682222 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:56:06.686592 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:56:06.688850 systemd[1]: Starting modprobe@loop.service... Aug 13 00:56:06.689712 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:56:06.689979 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:56:06.690245 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:56:06.694991 systemd[1]: Mounted usr-share-oem.mount. Aug 13 00:56:06.695859 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:56:06.696028 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:56:06.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.697051 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:56:06.697232 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:56:06.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.698152 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:56:06.698328 systemd[1]: Finished modprobe@loop.service. Aug 13 00:56:06.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.699500 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:56:06.699719 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:56:06.700833 systemd[1]: Finished systemd-sysext.service. Aug 13 00:56:06.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:06.702692 systemd[1]: Starting ensure-sysext.service... Aug 13 00:56:06.705050 systemd[1]: Starting systemd-tmpfiles-setup.service... Aug 13 00:56:06.714123 systemd[1]: Reloading. Aug 13 00:56:06.740028 systemd-tmpfiles[1501]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Aug 13 00:56:06.767355 systemd-tmpfiles[1501]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Aug 13 00:56:06.799413 systemd-tmpfiles[1501]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Aug 13 00:56:06.806822 /usr/lib/systemd/system-generators/torcx-generator[1521]: time="2025-08-13T00:56:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:56:06.806860 /usr/lib/systemd/system-generators/torcx-generator[1521]: time="2025-08-13T00:56:06Z" level=info msg="torcx already run" Aug 13 00:56:06.934558 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:56:06.934580 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:56:06.964488 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:56:07.076000 audit: BPF prog-id=24 op=LOAD Aug 13 00:56:07.076000 audit: BPF prog-id=15 op=UNLOAD Aug 13 00:56:07.076000 audit: BPF prog-id=25 op=LOAD Aug 13 00:56:07.076000 audit: BPF prog-id=26 op=LOAD Aug 13 00:56:07.076000 audit: BPF prog-id=16 op=UNLOAD Aug 13 00:56:07.076000 audit: BPF prog-id=17 op=UNLOAD Aug 13 00:56:07.077000 audit: BPF prog-id=27 op=LOAD Aug 13 00:56:07.077000 audit: BPF prog-id=20 op=UNLOAD Aug 13 00:56:07.080000 audit: BPF prog-id=28 op=LOAD Aug 13 00:56:07.080000 audit: BPF prog-id=21 op=UNLOAD Aug 13 00:56:07.080000 audit: BPF prog-id=29 op=LOAD Aug 13 00:56:07.080000 audit: BPF prog-id=30 op=LOAD Aug 13 00:56:07.080000 audit: BPF prog-id=22 op=UNLOAD Aug 13 00:56:07.080000 audit: BPF prog-id=23 op=UNLOAD Aug 13 00:56:07.083000 audit: BPF prog-id=31 op=LOAD Aug 13 00:56:07.083000 audit: BPF prog-id=32 op=LOAD Aug 13 00:56:07.083000 audit: BPF prog-id=18 op=UNLOAD Aug 13 00:56:07.083000 audit: BPF prog-id=19 op=UNLOAD Aug 13 00:56:07.091025 systemd[1]: Finished systemd-tmpfiles-setup.service. Aug 13 00:56:07.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.097378 systemd[1]: Starting audit-rules.service... Aug 13 00:56:07.099960 systemd[1]: Starting clean-ca-certificates.service... Aug 13 00:56:07.102758 systemd[1]: Starting systemd-journal-catalog-update.service... Aug 13 00:56:07.108000 audit: BPF prog-id=33 op=LOAD Aug 13 00:56:07.111171 systemd[1]: Starting systemd-resolved.service... Aug 13 00:56:07.113000 audit: BPF prog-id=34 op=LOAD Aug 13 00:56:07.116210 systemd[1]: Starting systemd-timesyncd.service... Aug 13 00:56:07.119829 systemd[1]: Starting systemd-update-utmp.service... Aug 13 00:56:07.133829 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.135698 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:56:07.138310 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:56:07.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.142595 systemd[1]: Starting modprobe@loop.service... Aug 13 00:56:07.143364 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.143564 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:56:07.144725 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:56:07.144903 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:56:07.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.149090 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:56:07.149409 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:56:07.150482 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:56:07.155000 audit[1583]: SYSTEM_BOOT pid=1583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.154948 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.156902 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:56:07.159277 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:56:07.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.161321 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.161525 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:56:07.162616 systemd[1]: Finished clean-ca-certificates.service. Aug 13 00:56:07.167649 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 00:56:07.175181 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.179352 systemd[1]: Starting modprobe@drm.service... Aug 13 00:56:07.180173 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.180373 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:56:07.180567 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 00:56:07.181595 systemd[1]: Finished systemd-update-utmp.service. Aug 13 00:56:07.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.183797 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:56:07.183966 systemd[1]: Finished modprobe@loop.service. Aug 13 00:56:07.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.190749 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 00:56:07.190925 systemd[1]: Finished modprobe@drm.service. Aug 13 00:56:07.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.192702 systemd[1]: Finished ensure-sysext.service. Aug 13 00:56:07.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.197641 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:56:07.197821 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:56:07.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.198565 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:56:07.200704 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:56:07.200874 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:56:07.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.201659 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.231927 systemd[1]: Finished systemd-journal-catalog-update.service. Aug 13 00:56:07.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:07.263000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Aug 13 00:56:07.263000 audit[1603]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc8bcd8b60 a2=420 a3=0 items=0 ppid=1577 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.263000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Aug 13 00:56:07.264891 augenrules[1603]: No rules Aug 13 00:56:07.266167 systemd[1]: Finished audit-rules.service. Aug 13 00:56:07.286588 systemd[1]: Started systemd-timesyncd.service. Aug 13 00:56:07.287318 systemd[1]: Reached target time-set.target. Aug 13 00:56:07.297089 systemd-resolved[1581]: Positive Trust Anchors: Aug 13 00:56:07.297104 systemd-resolved[1581]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 00:56:07.297145 systemd-resolved[1581]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 00:56:07.328361 systemd-resolved[1581]: Defaulting to hostname 'linux'. Aug 13 00:56:07.330101 systemd[1]: Started systemd-resolved.service. Aug 13 00:56:07.330591 systemd[1]: Reached target network.target. Aug 13 00:56:07.330935 systemd[1]: Reached target nss-lookup.target. Aug 13 00:56:07.444595 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:56:07.444619 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:56:07.466317 ldconfig[1468]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Aug 13 00:56:07.475262 systemd[1]: Finished ldconfig.service. Aug 13 00:56:07.476957 systemd[1]: Starting systemd-update-done.service... Aug 13 00:56:07.484576 systemd[1]: Finished systemd-update-done.service. Aug 13 00:56:07.485043 systemd[1]: Reached target sysinit.target. Aug 13 00:56:07.485484 systemd[1]: Started motdgen.path. Aug 13 00:56:07.485849 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Aug 13 00:56:07.486344 systemd[1]: Started logrotate.timer. Aug 13 00:56:07.486843 systemd[1]: Started mdadm.timer. Aug 13 00:56:07.487169 systemd[1]: Started systemd-tmpfiles-clean.timer. Aug 13 00:56:07.487522 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Aug 13 00:56:07.487556 systemd[1]: Reached target paths.target. Aug 13 00:56:07.487858 systemd[1]: Reached target timers.target. Aug 13 00:56:07.488469 systemd[1]: Listening on dbus.socket. Aug 13 00:56:07.489806 systemd[1]: Starting docker.socket... Aug 13 00:56:07.493480 systemd[1]: Listening on sshd.socket. Aug 13 00:56:07.493951 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:56:07.494449 systemd[1]: Listening on docker.socket. Aug 13 00:56:07.494932 systemd[1]: Reached target sockets.target. Aug 13 00:56:07.495266 systemd[1]: Reached target basic.target. Aug 13 00:56:07.495634 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.495665 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 00:56:07.496618 systemd[1]: Starting containerd.service... Aug 13 00:56:07.497923 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Aug 13 00:56:07.499573 systemd[1]: Starting dbus.service... Aug 13 00:56:07.501546 systemd[1]: Starting enable-oem-cloudinit.service... Aug 13 00:56:07.502829 systemd[1]: Starting extend-filesystems.service... Aug 13 00:56:07.503732 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Aug 13 00:56:07.507806 systemd[1]: Starting motdgen.service... Aug 13 00:56:07.509235 systemd[1]: Starting ssh-key-proc-cmdline.service... Aug 13 00:56:07.510597 systemd[1]: Starting sshd-keygen.service... Aug 13 00:56:07.513805 systemd[1]: Starting systemd-logind.service... Aug 13 00:56:07.516284 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:56:07.516350 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Aug 13 00:56:07.516757 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Aug 13 00:56:07.517439 systemd[1]: Starting update-engine.service... Aug 13 00:56:07.518809 systemd[1]: Starting update-ssh-keys-after-ignition.service... Aug 13 00:56:07.525681 jq[1624]: true Aug 13 00:56:07.527107 jq[1615]: false Aug 13 00:56:07.527348 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Aug 13 00:56:07.527514 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Aug 13 00:56:07.531428 systemd-timesyncd[1582]: Contacted time server 50.205.57.38:123 (0.flatcar.pool.ntp.org). Aug 13 00:56:07.531554 systemd-timesyncd[1582]: Initial clock synchronization to Wed 2025-08-13 00:56:07.332970 UTC. Aug 13 00:56:07.538866 jq[1626]: true Aug 13 00:56:07.543862 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Aug 13 00:56:07.544024 systemd[1]: Finished ssh-key-proc-cmdline.service. Aug 13 00:56:07.553616 systemd[1]: motdgen.service: Deactivated successfully. Aug 13 00:56:07.553785 systemd[1]: Finished motdgen.service. Aug 13 00:56:07.554212 extend-filesystems[1616]: Found loop1 Aug 13 00:56:07.554870 extend-filesystems[1616]: Found nvme0n1 Aug 13 00:56:07.555346 extend-filesystems[1616]: Found nvme0n1p1 Aug 13 00:56:07.555747 extend-filesystems[1616]: Found nvme0n1p2 Aug 13 00:56:07.556123 extend-filesystems[1616]: Found nvme0n1p3 Aug 13 00:56:07.556557 extend-filesystems[1616]: Found usr Aug 13 00:56:07.557214 extend-filesystems[1616]: Found nvme0n1p4 Aug 13 00:56:07.557591 extend-filesystems[1616]: Found nvme0n1p6 Aug 13 00:56:07.557941 extend-filesystems[1616]: Found nvme0n1p7 Aug 13 00:56:07.558312 extend-filesystems[1616]: Found nvme0n1p9 Aug 13 00:56:07.558738 extend-filesystems[1616]: Checking size of /dev/nvme0n1p9 Aug 13 00:56:07.588843 dbus-daemon[1614]: [system] SELinux support is enabled Aug 13 00:56:07.589543 systemd[1]: Started dbus.service. Aug 13 00:56:07.591883 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Aug 13 00:56:07.591912 systemd[1]: Reached target system-config.target. Aug 13 00:56:07.592284 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Aug 13 00:56:07.592305 systemd[1]: Reached target user-config.target. Aug 13 00:56:07.593594 dbus-daemon[1614]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1360 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Aug 13 00:56:07.597483 systemd[1]: Starting systemd-hostnamed.service... Aug 13 00:56:07.625726 bash[1657]: Updated "/home/core/.ssh/authorized_keys" Aug 13 00:56:07.626773 systemd[1]: Finished update-ssh-keys-after-ignition.service. Aug 13 00:56:07.633461 extend-filesystems[1616]: Resized partition /dev/nvme0n1p9 Aug 13 00:56:07.647747 extend-filesystems[1667]: resize2fs 1.46.5 (30-Dec-2021) Aug 13 00:56:07.648381 env[1633]: time="2025-08-13T00:56:07.648320051Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Aug 13 00:56:07.658251 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Aug 13 00:56:07.662986 systemd-logind[1621]: Watching system buttons on /dev/input/event1 (Power Button) Aug 13 00:56:07.663317 systemd-logind[1621]: Watching system buttons on /dev/input/event2 (Sleep Button) Aug 13 00:56:07.663985 systemd-logind[1621]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Aug 13 00:56:07.664844 systemd-logind[1621]: New seat seat0. Aug 13 00:56:07.669332 systemd[1]: Started systemd-logind.service. Aug 13 00:56:07.706547 update_engine[1623]: I0813 00:56:07.705742 1623 main.cc:92] Flatcar Update Engine starting Aug 13 00:56:07.710285 systemd[1]: Started update-engine.service. Aug 13 00:56:07.712657 systemd[1]: Started locksmithd.service. Aug 13 00:56:07.713722 update_engine[1623]: I0813 00:56:07.713625 1623 update_check_scheduler.cc:74] Next update check in 8m29s Aug 13 00:56:07.729231 env[1633]: time="2025-08-13T00:56:07.727598640Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Aug 13 00:56:07.729231 env[1633]: time="2025-08-13T00:56:07.727748959Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:56:07.733280 dbus-daemon[1614]: [system] Successfully activated service 'org.freedesktop.hostname1' Aug 13 00:56:07.733427 systemd[1]: Started systemd-hostnamed.service. Aug 13 00:56:07.734843 dbus-daemon[1614]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1659 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Aug 13 00:56:07.738772 systemd[1]: Starting polkit.service... Aug 13 00:56:07.744211 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Aug 13 00:56:07.750746 polkitd[1685]: Started polkitd version 121 Aug 13 00:56:07.758470 env[1633]: time="2025-08-13T00:56:07.756499039Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.189-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:56:07.758470 env[1633]: time="2025-08-13T00:56:07.756532826Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:56:07.758970 env[1633]: time="2025-08-13T00:56:07.758934901Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:56:07.759002 env[1633]: time="2025-08-13T00:56:07.758971668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Aug 13 00:56:07.759002 env[1633]: time="2025-08-13T00:56:07.758986961Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Aug 13 00:56:07.759002 env[1633]: time="2025-08-13T00:56:07.758996458Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Aug 13 00:56:07.759085 env[1633]: time="2025-08-13T00:56:07.759071906Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:56:07.759346 env[1633]: time="2025-08-13T00:56:07.759330460Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:56:07.759484 env[1633]: time="2025-08-13T00:56:07.759466576Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:56:07.759510 env[1633]: time="2025-08-13T00:56:07.759486366Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Aug 13 00:56:07.759543 env[1633]: time="2025-08-13T00:56:07.759530349Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Aug 13 00:56:07.759575 env[1633]: time="2025-08-13T00:56:07.759546110Z" level=info msg="metadata content store policy set" policy=shared Aug 13 00:56:07.763211 extend-filesystems[1667]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Aug 13 00:56:07.763211 extend-filesystems[1667]: old_desc_blocks = 1, new_desc_blocks = 1 Aug 13 00:56:07.763211 extend-filesystems[1667]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Aug 13 00:56:07.770397 extend-filesystems[1616]: Resized filesystem in /dev/nvme0n1p9 Aug 13 00:56:07.769583 polkitd[1685]: Loading rules from directory /etc/polkit-1/rules.d Aug 13 00:56:07.764437 systemd[1]: extend-filesystems.service: Deactivated successfully. Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771180254Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771229814Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771253414Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771284277Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771297424Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771310375Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771321727Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771334252Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771346497Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771358818Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771373802Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.771486 env[1633]: time="2025-08-13T00:56:07.771387429Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Aug 13 00:56:07.769640 polkitd[1685]: Loading rules from directory /usr/share/polkit-1/rules.d Aug 13 00:56:07.764605 systemd[1]: Finished extend-filesystems.service. Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.771499750Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.771568024Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.771901230Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.771933298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.771947015Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.771998982Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772011056Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772021733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772032023Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772083592Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772096695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772107713Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772118860Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772133730Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Aug 13 00:56:07.774246 env[1633]: time="2025-08-13T00:56:07.772296239Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.771808 polkitd[1685]: Finished loading, compiling and executing 2 rules Aug 13 00:56:07.772469 systemd[1]: Started polkit.service. Aug 13 00:56:07.775003 env[1633]: time="2025-08-13T00:56:07.772310551Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.775003 env[1633]: time="2025-08-13T00:56:07.772322560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.775003 env[1633]: time="2025-08-13T00:56:07.772333274Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Aug 13 00:56:07.775003 env[1633]: time="2025-08-13T00:56:07.772348086Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Aug 13 00:56:07.775003 env[1633]: time="2025-08-13T00:56:07.772358443Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Aug 13 00:56:07.775003 env[1633]: time="2025-08-13T00:56:07.772376419Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Aug 13 00:56:07.775003 env[1633]: time="2025-08-13T00:56:07.772410608Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Aug 13 00:56:07.772180 dbus-daemon[1614]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Aug 13 00:56:07.773609 systemd[1]: Started containerd.service. Aug 13 00:56:07.773714 polkitd[1685]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Aug 13 00:56:07.775863 env[1633]: time="2025-08-13T00:56:07.772613577Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Aug 13 00:56:07.775863 env[1633]: time="2025-08-13T00:56:07.772660869Z" level=info msg="Connect containerd service" Aug 13 00:56:07.775863 env[1633]: time="2025-08-13T00:56:07.772690174Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Aug 13 00:56:07.775863 env[1633]: time="2025-08-13T00:56:07.773236298Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 00:56:07.775863 env[1633]: time="2025-08-13T00:56:07.773474299Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Aug 13 00:56:07.775863 env[1633]: time="2025-08-13T00:56:07.773508826Z" level=info msg=serving... address=/run/containerd/containerd.sock Aug 13 00:56:07.775863 env[1633]: time="2025-08-13T00:56:07.774481607Z" level=info msg="containerd successfully booted in 0.144292s" Aug 13 00:56:07.778079 env[1633]: time="2025-08-13T00:56:07.777477121Z" level=info msg="Start subscribing containerd event" Aug 13 00:56:07.778079 env[1633]: time="2025-08-13T00:56:07.777532893Z" level=info msg="Start recovering state" Aug 13 00:56:07.778079 env[1633]: time="2025-08-13T00:56:07.777603504Z" level=info msg="Start event monitor" Aug 13 00:56:07.778079 env[1633]: time="2025-08-13T00:56:07.777617581Z" level=info msg="Start snapshots syncer" Aug 13 00:56:07.778079 env[1633]: time="2025-08-13T00:56:07.777628493Z" level=info msg="Start cni network conf syncer for default" Aug 13 00:56:07.778079 env[1633]: time="2025-08-13T00:56:07.777639987Z" level=info msg="Start streaming server" Aug 13 00:56:07.788288 systemd-networkd[1360]: eth0: Gained IPv6LL Aug 13 00:56:07.790610 systemd[1]: Finished systemd-networkd-wait-online.service. Aug 13 00:56:07.791361 systemd[1]: Reached target network-online.target. Aug 13 00:56:07.793127 systemd[1]: Started amazon-ssm-agent.service. Aug 13 00:56:07.796018 systemd[1]: Starting kubelet.service... Aug 13 00:56:07.797858 systemd[1]: Started nvidia.service. Aug 13 00:56:07.837795 systemd-hostnamed[1659]: Hostname set to (transient) Aug 13 00:56:07.871258 systemd-resolved[1581]: System hostname changed to 'ip-172-31-31-30'. Aug 13 00:56:07.949083 amazon-ssm-agent[1703]: 2025/08/13 00:56:07 Failed to load instance info from vault. RegistrationKey does not exist. Aug 13 00:56:07.951731 amazon-ssm-agent[1703]: Initializing new seelog logger Aug 13 00:56:07.965921 amazon-ssm-agent[1703]: New Seelog Logger Creation Complete Aug 13 00:56:07.966803 amazon-ssm-agent[1703]: 2025/08/13 00:56:07 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Aug 13 00:56:07.966894 amazon-ssm-agent[1703]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Aug 13 00:56:07.967122 amazon-ssm-agent[1703]: 2025/08/13 00:56:07 processing appconfig overrides Aug 13 00:56:08.002964 systemd[1]: nvidia.service: Deactivated successfully. Aug 13 00:56:08.054084 coreos-metadata[1613]: Aug 13 00:56:08.054 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Aug 13 00:56:08.057413 coreos-metadata[1613]: Aug 13 00:56:08.057 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Aug 13 00:56:08.058064 coreos-metadata[1613]: Aug 13 00:56:08.058 INFO Fetch successful Aug 13 00:56:08.058227 coreos-metadata[1613]: Aug 13 00:56:08.058 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Aug 13 00:56:08.059824 coreos-metadata[1613]: Aug 13 00:56:08.059 INFO Fetch successful Aug 13 00:56:08.063337 unknown[1613]: wrote ssh authorized keys file for user: core Aug 13 00:56:08.084475 update-ssh-keys[1779]: Updated "/home/core/.ssh/authorized_keys" Aug 13 00:56:08.087063 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Aug 13 00:56:08.088384 systemd[1]: Created slice system-sshd.slice. Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Create new startup processor Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [LongRunningPluginsManager] registered plugins: {} Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing bookkeeping folders Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO removing the completed state files Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing bookkeeping folders for long running plugins Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing healthcheck folders for long running plugins Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing locations for inventory plugin Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing default location for custom inventory Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing default location for file inventory Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Initializing default location for role inventory Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Init the cloudwatchlogs publisher Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:runPowerShellScript Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:updateSsmAgent Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:downloadContent Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:softwareInventory Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:configureDocker Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:runDockerAction Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:refreshAssociation Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:configurePackage Aug 13 00:56:08.284249 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform independent plugin aws:runDocument Aug 13 00:56:08.284738 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Successfully loaded platform dependent plugin aws:runShellScript Aug 13 00:56:08.284738 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Aug 13 00:56:08.284738 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO OS: linux, Arch: amd64 Aug 13 00:56:08.285861 amazon-ssm-agent[1703]: datastore file /var/lib/amazon/ssm/i-0502a94d0754b36b0/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Aug 13 00:56:08.290012 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] Starting document processing engine... Aug 13 00:56:08.386150 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] [EngineProcessor] Starting Aug 13 00:56:08.405965 locksmithd[1677]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Aug 13 00:56:08.480470 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Aug 13 00:56:08.575034 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] Starting message polling Aug 13 00:56:08.670224 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] Starting send replies to MDS Aug 13 00:56:08.765094 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [instanceID=i-0502a94d0754b36b0] Starting association polling Aug 13 00:56:08.860253 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Aug 13 00:56:08.955455 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] [Association] Launching response handler Aug 13 00:56:09.050939 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Aug 13 00:56:09.146684 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Aug 13 00:56:09.242509 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Aug 13 00:56:09.338934 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [OfflineService] Starting document processing engine... Aug 13 00:56:09.435243 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [OfflineService] [EngineProcessor] Starting Aug 13 00:56:09.462415 sshd_keygen[1631]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Aug 13 00:56:09.489262 systemd[1]: Finished sshd-keygen.service. Aug 13 00:56:09.491847 systemd[1]: Starting issuegen.service... Aug 13 00:56:09.494577 systemd[1]: Started sshd@0-172.31.31.30:22-147.75.109.163:47644.service. Aug 13 00:56:09.504516 systemd[1]: issuegen.service: Deactivated successfully. Aug 13 00:56:09.504735 systemd[1]: Finished issuegen.service. Aug 13 00:56:09.507081 systemd[1]: Starting systemd-user-sessions.service... Aug 13 00:56:09.516214 systemd[1]: Finished systemd-user-sessions.service. Aug 13 00:56:09.518471 systemd[1]: Started getty@tty1.service. Aug 13 00:56:09.521012 systemd[1]: Started serial-getty@ttyS0.service. Aug 13 00:56:09.522151 systemd[1]: Reached target getty.target. Aug 13 00:56:09.531624 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [OfflineService] [EngineProcessor] Initial processing Aug 13 00:56:09.628286 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [OfflineService] Starting message polling Aug 13 00:56:09.725254 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [OfflineService] Starting send replies to MDS Aug 13 00:56:09.725555 sshd[1811]: Accepted publickey for core from 147.75.109.163 port 47644 ssh2: RSA SHA256:LgPaLKY3LN4TBfyOIoir69nxEAguUoPITi+qXSaDutg Aug 13 00:56:09.728194 sshd[1811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:09.740319 systemd[1]: Created slice user-500.slice. Aug 13 00:56:09.742209 systemd[1]: Starting user-runtime-dir@500.service... Aug 13 00:56:09.750259 systemd-logind[1621]: New session 1 of user core. Aug 13 00:56:09.758570 systemd[1]: Finished user-runtime-dir@500.service. Aug 13 00:56:09.761795 systemd[1]: Starting user@500.service... Aug 13 00:56:09.766905 (systemd)[1819]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:09.822254 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [LongRunningPluginsManager] starting long running plugin manager Aug 13 00:56:09.886338 systemd[1819]: Queued start job for default target default.target. Aug 13 00:56:09.886855 systemd[1819]: Reached target paths.target. Aug 13 00:56:09.886877 systemd[1819]: Reached target sockets.target. Aug 13 00:56:09.886890 systemd[1819]: Reached target timers.target. Aug 13 00:56:09.886901 systemd[1819]: Reached target basic.target. Aug 13 00:56:09.886943 systemd[1819]: Reached target default.target. Aug 13 00:56:09.886970 systemd[1819]: Startup finished in 111ms. Aug 13 00:56:09.887053 systemd[1]: Started user@500.service. Aug 13 00:56:09.888501 systemd[1]: Started session-1.scope. Aug 13 00:56:09.919522 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Aug 13 00:56:10.016955 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [HealthCheck] HealthCheck reporting agent health. Aug 13 00:56:10.028287 systemd[1]: Started sshd@1-172.31.31.30:22-147.75.109.163:58058.service. Aug 13 00:56:10.050331 systemd[1]: Started kubelet.service. Aug 13 00:56:10.051444 systemd[1]: Reached target multi-user.target. Aug 13 00:56:10.053799 systemd[1]: Starting systemd-update-utmp-runlevel.service... Aug 13 00:56:10.061120 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Aug 13 00:56:10.061460 systemd[1]: Finished systemd-update-utmp-runlevel.service. Aug 13 00:56:10.062294 systemd[1]: Startup finished in 600ms (kernel) + 5.568s (initrd) + 9.741s (userspace) = 15.911s. Aug 13 00:56:10.114529 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] Starting session document processing engine... Aug 13 00:56:10.192659 sshd[1828]: Accepted publickey for core from 147.75.109.163 port 58058 ssh2: RSA SHA256:LgPaLKY3LN4TBfyOIoir69nxEAguUoPITi+qXSaDutg Aug 13 00:56:10.193987 sshd[1828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:10.198466 systemd-logind[1621]: New session 2 of user core. Aug 13 00:56:10.199230 systemd[1]: Started session-2.scope. Aug 13 00:56:10.212449 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] [EngineProcessor] Starting Aug 13 00:56:10.310456 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Aug 13 00:56:10.326434 sshd[1828]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:10.329022 systemd[1]: sshd@1-172.31.31.30:22-147.75.109.163:58058.service: Deactivated successfully. Aug 13 00:56:10.329719 systemd[1]: session-2.scope: Deactivated successfully. Aug 13 00:56:10.330269 systemd-logind[1621]: Session 2 logged out. Waiting for processes to exit. Aug 13 00:56:10.331011 systemd-logind[1621]: Removed session 2. Aug 13 00:56:10.350551 systemd[1]: Started sshd@2-172.31.31.30:22-147.75.109.163:58068.service. Aug 13 00:56:10.408664 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0502a94d0754b36b0, requestId: 0e90c95d-bce0-47b1-802b-afdcc17c5d13 Aug 13 00:56:10.507000 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] listening reply. Aug 13 00:56:10.511208 sshd[1843]: Accepted publickey for core from 147.75.109.163 port 58068 ssh2: RSA SHA256:LgPaLKY3LN4TBfyOIoir69nxEAguUoPITi+qXSaDutg Aug 13 00:56:10.512449 sshd[1843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:10.517248 systemd-logind[1621]: New session 3 of user core. Aug 13 00:56:10.517797 systemd[1]: Started session-3.scope. Aug 13 00:56:10.606164 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Aug 13 00:56:10.637545 sshd[1843]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:10.641027 systemd[1]: sshd@2-172.31.31.30:22-147.75.109.163:58068.service: Deactivated successfully. Aug 13 00:56:10.641096 systemd-logind[1621]: Session 3 logged out. Waiting for processes to exit. Aug 13 00:56:10.641658 systemd[1]: session-3.scope: Deactivated successfully. Aug 13 00:56:10.642431 systemd-logind[1621]: Removed session 3. Aug 13 00:56:10.662493 systemd[1]: Started sshd@3-172.31.31.30:22-147.75.109.163:58078.service. Aug 13 00:56:10.704450 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [StartupProcessor] Executing startup processor tasks Aug 13 00:56:10.803553 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Aug 13 00:56:10.824762 sshd[1849]: Accepted publickey for core from 147.75.109.163 port 58078 ssh2: RSA SHA256:LgPaLKY3LN4TBfyOIoir69nxEAguUoPITi+qXSaDutg Aug 13 00:56:10.826416 sshd[1849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:10.833113 systemd[1]: Started session-4.scope. Aug 13 00:56:10.834077 systemd-logind[1621]: New session 4 of user core. Aug 13 00:56:10.902753 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Aug 13 00:56:10.958932 sshd[1849]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:10.962266 systemd[1]: sshd@3-172.31.31.30:22-147.75.109.163:58078.service: Deactivated successfully. Aug 13 00:56:10.962925 systemd[1]: session-4.scope: Deactivated successfully. Aug 13 00:56:10.963484 systemd-logind[1621]: Session 4 logged out. Waiting for processes to exit. Aug 13 00:56:10.964339 systemd-logind[1621]: Removed session 4. Aug 13 00:56:10.982658 systemd[1]: Started sshd@4-172.31.31.30:22-147.75.109.163:58090.service. Aug 13 00:56:11.002140 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Aug 13 00:56:11.101708 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0502a94d0754b36b0?role=subscribe&stream=input Aug 13 00:56:11.102725 kubelet[1832]: E0813 00:56:11.102690 1832 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 00:56:11.104365 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 00:56:11.104497 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 00:56:11.104739 systemd[1]: kubelet.service: Consumed 1.147s CPU time. Aug 13 00:56:11.142748 sshd[1855]: Accepted publickey for core from 147.75.109.163 port 58090 ssh2: RSA SHA256:LgPaLKY3LN4TBfyOIoir69nxEAguUoPITi+qXSaDutg Aug 13 00:56:11.144068 sshd[1855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:11.148900 systemd[1]: Started session-5.scope. Aug 13 00:56:11.149351 systemd-logind[1621]: New session 5 of user core. Aug 13 00:56:11.201626 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0502a94d0754b36b0?role=subscribe&stream=input Aug 13 00:56:11.265785 sudo[1858]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Aug 13 00:56:11.266037 sudo[1858]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:56:11.273368 dbus-daemon[1614]: Н,\xa0\xbbU: received setenforce notice (enforcing=-437013664) Aug 13 00:56:11.275152 sudo[1858]: pam_unix(sudo:session): session closed for user root Aug 13 00:56:11.298631 sshd[1855]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:11.301482 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] Starting receiving message from control channel Aug 13 00:56:11.302123 systemd[1]: sshd@4-172.31.31.30:22-147.75.109.163:58090.service: Deactivated successfully. Aug 13 00:56:11.303115 systemd[1]: session-5.scope: Deactivated successfully. Aug 13 00:56:11.303826 systemd-logind[1621]: Session 5 logged out. Waiting for processes to exit. Aug 13 00:56:11.304825 systemd-logind[1621]: Removed session 5. Aug 13 00:56:11.324614 systemd[1]: Started sshd@5-172.31.31.30:22-147.75.109.163:58092.service. Aug 13 00:56:11.401798 amazon-ssm-agent[1703]: 2025-08-13 00:56:08 INFO [MessageGatewayService] [EngineProcessor] Initial processing Aug 13 00:56:11.485744 sshd[1862]: Accepted publickey for core from 147.75.109.163 port 58092 ssh2: RSA SHA256:LgPaLKY3LN4TBfyOIoir69nxEAguUoPITi+qXSaDutg Aug 13 00:56:11.487557 sshd[1862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:11.492102 systemd[1]: Started session-6.scope. Aug 13 00:56:11.492572 systemd-logind[1621]: New session 6 of user core. Aug 13 00:56:11.594954 sudo[1866]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Aug 13 00:56:11.595299 sudo[1866]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:56:11.598517 sudo[1866]: pam_unix(sudo:session): session closed for user root Aug 13 00:56:11.603694 sudo[1865]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Aug 13 00:56:11.604000 sudo[1865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:56:11.614123 systemd[1]: Stopping audit-rules.service... Aug 13 00:56:11.614000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 00:56:11.616737 kernel: kauditd_printk_skb: 217 callbacks suppressed Aug 13 00:56:11.616778 kernel: audit: type=1305 audit(1755046571.614:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 00:56:11.614000 audit[1869]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff8492f190 a2=420 a3=0 items=0 ppid=1 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.624091 kernel: audit: type=1300 audit(1755046571.614:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff8492f190 a2=420 a3=0 items=0 ppid=1 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.624170 kernel: audit: type=1327 audit(1755046571.614:198): proctitle=2F7362696E2F617564697463746C002D44 Aug 13 00:56:11.614000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Aug 13 00:56:11.624282 auditctl[1869]: No rules Aug 13 00:56:11.630539 kernel: audit: type=1131 audit(1755046571.623:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.625052 systemd[1]: audit-rules.service: Deactivated successfully. Aug 13 00:56:11.625285 systemd[1]: Stopped audit-rules.service. Aug 13 00:56:11.630343 systemd[1]: Starting audit-rules.service... Aug 13 00:56:11.650680 augenrules[1886]: No rules Aug 13 00:56:11.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.652767 sudo[1865]: pam_unix(sudo:session): session closed for user root Aug 13 00:56:11.651515 systemd[1]: Finished audit-rules.service. Aug 13 00:56:11.651000 audit[1865]: USER_END pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.660270 kernel: audit: type=1130 audit(1755046571.651:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.660366 kernel: audit: type=1106 audit(1755046571.651:201): pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.660475 kernel: audit: type=1104 audit(1755046571.651:202): pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.651000 audit[1865]: CRED_DISP pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.675021 sshd[1862]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:11.675000 audit[1862]: USER_END pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.678047 systemd[1]: sshd@5-172.31.31.30:22-147.75.109.163:58092.service: Deactivated successfully. Aug 13 00:56:11.679335 systemd[1]: session-6.scope: Deactivated successfully. Aug 13 00:56:11.680890 systemd-logind[1621]: Session 6 logged out. Waiting for processes to exit. Aug 13 00:56:11.682072 systemd-logind[1621]: Removed session 6. Aug 13 00:56:11.675000 audit[1862]: CRED_DISP pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.686939 kernel: audit: type=1106 audit(1755046571.675:203): pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.686993 kernel: audit: type=1104 audit(1755046571.675:204): pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.687022 kernel: audit: type=1131 audit(1755046571.675:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.30:22-147.75.109.163:58092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.30:22-147.75.109.163:58092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.699862 systemd[1]: Started sshd@6-172.31.31.30:22-147.75.109.163:58094.service. Aug 13 00:56:11.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.30:22-147.75.109.163:58094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.857000 audit[1892]: USER_ACCT pid=1892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.858000 audit[1892]: CRED_ACQ pid=1892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.859000 audit[1892]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff53a24fa0 a2=3 a3=0 items=0 ppid=1 pid=1892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.859000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 00:56:11.860447 sshd[1892]: Accepted publickey for core from 147.75.109.163 port 58094 ssh2: RSA SHA256:LgPaLKY3LN4TBfyOIoir69nxEAguUoPITi+qXSaDutg Aug 13 00:56:11.860620 sshd[1892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:11.865275 systemd-logind[1621]: New session 7 of user core. Aug 13 00:56:11.865402 systemd[1]: Started session-7.scope. Aug 13 00:56:11.870000 audit[1892]: USER_START pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.873000 audit[1894]: CRED_ACQ pid=1894 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:11.967000 audit[1895]: USER_ACCT pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.968576 sudo[1895]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Aug 13 00:56:11.967000 audit[1895]: CRED_REFR pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.968874 sudo[1895]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:56:11.969000 audit[1895]: USER_START pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:11.983527 systemd[1]: Starting coreos-metadata.service... Aug 13 00:56:12.065252 coreos-metadata[1899]: Aug 13 00:56:12.065 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Aug 13 00:56:12.066119 coreos-metadata[1899]: Aug 13 00:56:12.066 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Aug 13 00:56:12.066698 coreos-metadata[1899]: Aug 13 00:56:12.066 INFO Fetch successful Aug 13 00:56:12.066772 coreos-metadata[1899]: Aug 13 00:56:12.066 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Aug 13 00:56:12.067377 coreos-metadata[1899]: Aug 13 00:56:12.067 INFO Fetch successful Aug 13 00:56:12.067496 coreos-metadata[1899]: Aug 13 00:56:12.067 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Aug 13 00:56:12.068147 coreos-metadata[1899]: Aug 13 00:56:12.068 INFO Fetch successful Aug 13 00:56:12.068274 coreos-metadata[1899]: Aug 13 00:56:12.068 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Aug 13 00:56:12.068689 coreos-metadata[1899]: Aug 13 00:56:12.068 INFO Fetch successful Aug 13 00:56:12.068742 coreos-metadata[1899]: Aug 13 00:56:12.068 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Aug 13 00:56:12.069201 coreos-metadata[1899]: Aug 13 00:56:12.069 INFO Fetch successful Aug 13 00:56:12.069201 coreos-metadata[1899]: Aug 13 00:56:12.069 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Aug 13 00:56:12.069827 coreos-metadata[1899]: Aug 13 00:56:12.069 INFO Fetch successful Aug 13 00:56:12.069827 coreos-metadata[1899]: Aug 13 00:56:12.069 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Aug 13 00:56:12.070345 coreos-metadata[1899]: Aug 13 00:56:12.070 INFO Fetch successful Aug 13 00:56:12.070392 coreos-metadata[1899]: Aug 13 00:56:12.070 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Aug 13 00:56:12.070819 coreos-metadata[1899]: Aug 13 00:56:12.070 INFO Fetch successful Aug 13 00:56:12.079516 systemd[1]: Finished coreos-metadata.service. Aug 13 00:56:12.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:13.004292 systemd[1]: Stopped kubelet.service. Aug 13 00:56:13.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:13.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:13.005144 systemd[1]: kubelet.service: Consumed 1.147s CPU time. Aug 13 00:56:13.007643 systemd[1]: Starting kubelet.service... Aug 13 00:56:13.042442 systemd[1]: Reloading. Aug 13 00:56:13.175636 /usr/lib/systemd/system-generators/torcx-generator[1951]: time="2025-08-13T00:56:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:56:13.177286 /usr/lib/systemd/system-generators/torcx-generator[1951]: time="2025-08-13T00:56:13Z" level=info msg="torcx already run" Aug 13 00:56:13.297941 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:56:13.297966 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:56:13.316751 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.393000 audit: BPF prog-id=43 op=LOAD Aug 13 00:56:13.393000 audit: BPF prog-id=24 op=UNLOAD Aug 13 00:56:13.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit: BPF prog-id=44 op=LOAD Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.394000 audit: BPF prog-id=45 op=LOAD Aug 13 00:56:13.394000 audit: BPF prog-id=25 op=UNLOAD Aug 13 00:56:13.394000 audit: BPF prog-id=26 op=UNLOAD Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit: BPF prog-id=46 op=LOAD Aug 13 00:56:13.396000 audit: BPF prog-id=35 op=UNLOAD Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit: BPF prog-id=47 op=LOAD Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.396000 audit: BPF prog-id=48 op=LOAD Aug 13 00:56:13.397000 audit: BPF prog-id=36 op=UNLOAD Aug 13 00:56:13.397000 audit: BPF prog-id=37 op=UNLOAD Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit: BPF prog-id=49 op=LOAD Aug 13 00:56:13.398000 audit: BPF prog-id=34 op=UNLOAD Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.399000 audit: BPF prog-id=50 op=LOAD Aug 13 00:56:13.399000 audit: BPF prog-id=27 op=UNLOAD Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.400000 audit: BPF prog-id=51 op=LOAD Aug 13 00:56:13.400000 audit: BPF prog-id=41 op=UNLOAD Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit: BPF prog-id=52 op=LOAD Aug 13 00:56:13.402000 audit: BPF prog-id=38 op=UNLOAD Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit: BPF prog-id=53 op=LOAD Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.402000 audit: BPF prog-id=54 op=LOAD Aug 13 00:56:13.402000 audit: BPF prog-id=39 op=UNLOAD Aug 13 00:56:13.402000 audit: BPF prog-id=40 op=UNLOAD Aug 13 00:56:13.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit: BPF prog-id=55 op=LOAD Aug 13 00:56:13.404000 audit: BPF prog-id=28 op=UNLOAD Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit: BPF prog-id=56 op=LOAD Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.404000 audit: BPF prog-id=57 op=LOAD Aug 13 00:56:13.404000 audit: BPF prog-id=29 op=UNLOAD Aug 13 00:56:13.404000 audit: BPF prog-id=30 op=UNLOAD Aug 13 00:56:13.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit: BPF prog-id=58 op=LOAD Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit: BPF prog-id=59 op=LOAD Aug 13 00:56:13.408000 audit: BPF prog-id=31 op=UNLOAD Aug 13 00:56:13.408000 audit: BPF prog-id=32 op=UNLOAD Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:13.409000 audit: BPF prog-id=60 op=LOAD Aug 13 00:56:13.409000 audit: BPF prog-id=33 op=UNLOAD Aug 13 00:56:13.430972 systemd[1]: Started kubelet.service. Aug 13 00:56:13.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:13.433664 systemd[1]: Stopping kubelet.service... Aug 13 00:56:13.434335 systemd[1]: kubelet.service: Deactivated successfully. Aug 13 00:56:13.434686 systemd[1]: Stopped kubelet.service. Aug 13 00:56:13.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:13.436574 systemd[1]: Starting kubelet.service... Aug 13 00:56:13.655009 amazon-ssm-agent[1703]: 2025-08-13 00:56:13 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Aug 13 00:56:13.777404 systemd[1]: Started kubelet.service. Aug 13 00:56:13.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:13.820199 kubelet[2014]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 00:56:13.820501 kubelet[2014]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Aug 13 00:56:13.820542 kubelet[2014]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 00:56:13.820675 kubelet[2014]: I0813 00:56:13.820655 2014 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Aug 13 00:56:14.153859 kubelet[2014]: I0813 00:56:14.153756 2014 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Aug 13 00:56:14.153859 kubelet[2014]: I0813 00:56:14.153789 2014 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Aug 13 00:56:14.154384 kubelet[2014]: I0813 00:56:14.154357 2014 server.go:954] "Client rotation is on, will bootstrap in background" Aug 13 00:56:14.190390 kubelet[2014]: I0813 00:56:14.190349 2014 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Aug 13 00:56:14.199376 kubelet[2014]: E0813 00:56:14.199326 2014 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Aug 13 00:56:14.199540 kubelet[2014]: I0813 00:56:14.199406 2014 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Aug 13 00:56:14.202364 kubelet[2014]: I0813 00:56:14.202297 2014 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Aug 13 00:56:14.204460 kubelet[2014]: I0813 00:56:14.204408 2014 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Aug 13 00:56:14.204655 kubelet[2014]: I0813 00:56:14.204465 2014 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.31.30","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Aug 13 00:56:14.204655 kubelet[2014]: I0813 00:56:14.204641 2014 topology_manager.go:138] "Creating topology manager with none policy" Aug 13 00:56:14.204655 kubelet[2014]: I0813 00:56:14.204650 2014 container_manager_linux.go:304] "Creating device plugin manager" Aug 13 00:56:14.204993 kubelet[2014]: I0813 00:56:14.204880 2014 state_mem.go:36] "Initialized new in-memory state store" Aug 13 00:56:14.210241 kubelet[2014]: I0813 00:56:14.210209 2014 kubelet.go:446] "Attempting to sync node with API server" Aug 13 00:56:14.219835 kubelet[2014]: I0813 00:56:14.219787 2014 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Aug 13 00:56:14.219835 kubelet[2014]: I0813 00:56:14.219849 2014 kubelet.go:352] "Adding apiserver pod source" Aug 13 00:56:14.220058 kubelet[2014]: I0813 00:56:14.219861 2014 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Aug 13 00:56:14.229620 kubelet[2014]: E0813 00:56:14.229573 2014 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:14.229620 kubelet[2014]: E0813 00:56:14.229630 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:14.233845 kubelet[2014]: I0813 00:56:14.233826 2014 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Aug 13 00:56:14.234434 kubelet[2014]: I0813 00:56:14.234413 2014 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Aug 13 00:56:14.235287 kubelet[2014]: W0813 00:56:14.235262 2014 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Aug 13 00:56:14.238432 kubelet[2014]: I0813 00:56:14.238403 2014 watchdog_linux.go:99] "Systemd watchdog is not enabled" Aug 13 00:56:14.238526 kubelet[2014]: I0813 00:56:14.238448 2014 server.go:1287] "Started kubelet" Aug 13 00:56:14.238651 kubelet[2014]: I0813 00:56:14.238609 2014 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Aug 13 00:56:14.239644 kubelet[2014]: I0813 00:56:14.239450 2014 server.go:479] "Adding debug handlers to kubelet server" Aug 13 00:56:14.240000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:14.240000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:56:14.240000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b3ad20 a1=c000b24738 a2=c000b3acf0 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.240000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:56:14.240000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:14.240000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:56:14.240000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b18660 a1=c000b24750 a2=c000b3adb0 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.240000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:56:14.241991 kubelet[2014]: I0813 00:56:14.241633 2014 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Aug 13 00:56:14.241991 kubelet[2014]: I0813 00:56:14.241675 2014 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Aug 13 00:56:14.241991 kubelet[2014]: I0813 00:56:14.241724 2014 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Aug 13 00:56:14.244709 kubelet[2014]: I0813 00:56:14.244647 2014 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Aug 13 00:56:14.244927 kubelet[2014]: I0813 00:56:14.244868 2014 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Aug 13 00:56:14.251461 kubelet[2014]: I0813 00:56:14.251444 2014 volume_manager.go:297] "Starting Kubelet Volume Manager" Aug 13 00:56:14.251873 kubelet[2014]: I0813 00:56:14.251830 2014 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Aug 13 00:56:14.254901 kubelet[2014]: I0813 00:56:14.254875 2014 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Aug 13 00:56:14.254981 kubelet[2014]: I0813 00:56:14.254934 2014 reconciler.go:26] "Reconciler: start to sync state" Aug 13 00:56:14.258950 kubelet[2014]: E0813 00:56:14.258918 2014 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Aug 13 00:56:14.261105 kubelet[2014]: E0813 00:56:14.261080 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:14.261673 kubelet[2014]: I0813 00:56:14.261652 2014 factory.go:221] Registration of the systemd container factory successfully Aug 13 00:56:14.261791 kubelet[2014]: I0813 00:56:14.261757 2014 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Aug 13 00:56:14.269957 kubelet[2014]: I0813 00:56:14.269918 2014 factory.go:221] Registration of the containerd container factory successfully Aug 13 00:56:14.273921 kubelet[2014]: E0813 00:56:14.273859 2014 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.31.30\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Aug 13 00:56:14.274233 kubelet[2014]: W0813 00:56:14.274212 2014 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.31.30" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Aug 13 00:56:14.274368 kubelet[2014]: E0813 00:56:14.274350 2014 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.31.30\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Aug 13 00:56:14.274579 kubelet[2014]: W0813 00:56:14.274565 2014 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Aug 13 00:56:14.274697 kubelet[2014]: E0813 00:56:14.274680 2014 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Aug 13 00:56:14.276869 kubelet[2014]: E0813 00:56:14.274878 2014 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.30.185b2d8f85bf599d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.30,UID:172.31.31.30,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.31.30,},FirstTimestamp:2025-08-13 00:56:14.238423453 +0000 UTC m=+0.456177563,LastTimestamp:2025-08-13 00:56:14.238423453 +0000 UTC m=+0.456177563,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.30,}" Aug 13 00:56:14.277055 kubelet[2014]: W0813 00:56:14.277032 2014 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Aug 13 00:56:14.277114 kubelet[2014]: E0813 00:56:14.277060 2014 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Aug 13 00:56:14.300785 kubelet[2014]: E0813 00:56:14.300650 2014 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.30.185b2d8f86f7d405 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.30,UID:172.31.31.30,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.31.30,},FirstTimestamp:2025-08-13 00:56:14.258902021 +0000 UTC m=+0.476656137,LastTimestamp:2025-08-13 00:56:14.258902021 +0000 UTC m=+0.476656137,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.30,}" Aug 13 00:56:14.305042 kubelet[2014]: I0813 00:56:14.305014 2014 cpu_manager.go:221] "Starting CPU manager" policy="none" Aug 13 00:56:14.305213 kubelet[2014]: I0813 00:56:14.305174 2014 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Aug 13 00:56:14.305291 kubelet[2014]: I0813 00:56:14.305282 2014 state_mem.go:36] "Initialized new in-memory state store" Aug 13 00:56:14.308135 kubelet[2014]: I0813 00:56:14.308114 2014 policy_none.go:49] "None policy: Start" Aug 13 00:56:14.308306 kubelet[2014]: I0813 00:56:14.308293 2014 memory_manager.go:186] "Starting memorymanager" policy="None" Aug 13 00:56:14.308419 kubelet[2014]: I0813 00:56:14.308409 2014 state_mem.go:35] "Initializing new in-memory state store" Aug 13 00:56:14.319165 systemd[1]: Created slice kubepods.slice. Aug 13 00:56:14.326747 systemd[1]: Created slice kubepods-burstable.slice. Aug 13 00:56:14.331164 systemd[1]: Created slice kubepods-besteffort.slice. Aug 13 00:56:14.334575 kubelet[2014]: E0813 00:56:14.320915 2014 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.30.185b2d8f898c0159 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.30,UID:172.31.31.30,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.31.30 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.31.30,},FirstTimestamp:2025-08-13 00:56:14.302167385 +0000 UTC m=+0.519921503,LastTimestamp:2025-08-13 00:56:14.302167385 +0000 UTC m=+0.519921503,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.30,}" Aug 13 00:56:14.336000 audit[2029]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2029 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.336000 audit[2029]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb3e8b1b0 a2=0 a3=7ffcb3e8b19c items=0 ppid=2014 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 00:56:14.338000 audit[2035]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.338000 audit[2035]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe9c20fc70 a2=0 a3=7ffe9c20fc5c items=0 ppid=2014 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 00:56:14.341460 kubelet[2014]: I0813 00:56:14.341426 2014 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Aug 13 00:56:14.340000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:14.340000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:56:14.340000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fb680 a1=c0009d5548 a2=c0009fb650 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.340000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:56:14.341796 kubelet[2014]: I0813 00:56:14.341506 2014 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Aug 13 00:56:14.341796 kubelet[2014]: I0813 00:56:14.341628 2014 eviction_manager.go:189] "Eviction manager: starting control loop" Aug 13 00:56:14.341796 kubelet[2014]: I0813 00:56:14.341641 2014 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Aug 13 00:56:14.343288 kubelet[2014]: I0813 00:56:14.342469 2014 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Aug 13 00:56:14.346579 kubelet[2014]: E0813 00:56:14.346556 2014 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Aug 13 00:56:14.346680 kubelet[2014]: E0813 00:56:14.346602 2014 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.30\" not found" Aug 13 00:56:14.346000 audit[2037]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.346000 audit[2037]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff3b1f7a60 a2=0 a3=7fff3b1f7a4c items=0 ppid=2014 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:14.363000 audit[2042]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2042 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.363000 audit[2042]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb4445860 a2=0 a3=7fffb444584c items=0 ppid=2014 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:14.443255 kubelet[2014]: I0813 00:56:14.443152 2014 kubelet_node_status.go:75] "Attempting to register node" node="172.31.31.30" Aug 13 00:56:14.454111 kubelet[2014]: I0813 00:56:14.454083 2014 kubelet_node_status.go:78] "Successfully registered node" node="172.31.31.30" Aug 13 00:56:14.454306 kubelet[2014]: E0813 00:56:14.454293 2014 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"172.31.31.30\": node \"172.31.31.30\" not found" Aug 13 00:56:14.462000 audit[2047]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.462000 audit[2047]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe7a115760 a2=0 a3=7ffe7a11574c items=0 ppid=2014 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Aug 13 00:56:14.464251 kubelet[2014]: I0813 00:56:14.464184 2014 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Aug 13 00:56:14.464000 audit[2048]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2048 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:14.464000 audit[2048]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff8ca50e80 a2=0 a3=7fff8ca50e6c items=0 ppid=2014 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 00:56:14.464000 audit[2049]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2049 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.464000 audit[2049]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1ac55ee0 a2=0 a3=7ffc1ac55ecc items=0 ppid=2014 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 00:56:14.466239 kubelet[2014]: I0813 00:56:14.466221 2014 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Aug 13 00:56:14.466312 kubelet[2014]: I0813 00:56:14.466245 2014 status_manager.go:227] "Starting to sync pod status with apiserver" Aug 13 00:56:14.466312 kubelet[2014]: I0813 00:56:14.466265 2014 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Aug 13 00:56:14.466312 kubelet[2014]: I0813 00:56:14.466272 2014 kubelet.go:2382] "Starting kubelet main sync loop" Aug 13 00:56:14.466393 kubelet[2014]: E0813 00:56:14.466372 2014 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Aug 13 00:56:14.466000 audit[2050]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2050 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:14.466000 audit[2050]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc323962b0 a2=0 a3=7ffc3239629c items=0 ppid=2014 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 00:56:14.467000 audit[2051]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.467000 audit[2051]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd03a33950 a2=0 a3=7ffd03a3393c items=0 ppid=2014 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 00:56:14.468000 audit[2052]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:14.468000 audit[2052]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7f931180 a2=0 a3=7ffe7f93116c items=0 ppid=2014 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 00:56:14.468000 audit[2053]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:14.468000 audit[2053]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffde4842ff0 a2=0 a3=7ffde4842fdc items=0 ppid=2014 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 00:56:14.469000 audit[2054]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2054 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:14.469000 audit[2054]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd2cb55230 a2=0 a3=7ffd2cb5521c items=0 ppid=2014 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:14.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 00:56:14.479621 kubelet[2014]: E0813 00:56:14.479574 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:14.579967 kubelet[2014]: E0813 00:56:14.579908 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:14.680791 kubelet[2014]: E0813 00:56:14.680740 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:14.781316 kubelet[2014]: E0813 00:56:14.781214 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:14.881963 kubelet[2014]: E0813 00:56:14.881899 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:14.982729 kubelet[2014]: E0813 00:56:14.982688 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:15.083473 kubelet[2014]: E0813 00:56:15.083361 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:15.158733 kubelet[2014]: I0813 00:56:15.158687 2014 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Aug 13 00:56:15.158875 kubelet[2014]: W0813 00:56:15.158858 2014 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Aug 13 00:56:15.184151 kubelet[2014]: E0813 00:56:15.184099 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:15.230583 kubelet[2014]: E0813 00:56:15.230540 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:15.284925 kubelet[2014]: E0813 00:56:15.284841 2014 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.30\" not found" Aug 13 00:56:15.328070 sudo[1895]: pam_unix(sudo:session): session closed for user root Aug 13 00:56:15.327000 audit[1895]: USER_END pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:15.328000 audit[1895]: CRED_DISP pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:15.350000 audit[1892]: USER_END pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:15.350000 audit[1892]: CRED_DISP pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Aug 13 00:56:15.350768 sshd[1892]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:15.353600 systemd[1]: sshd@6-172.31.31.30:22-147.75.109.163:58094.service: Deactivated successfully. Aug 13 00:56:15.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.30:22-147.75.109.163:58094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:15.354305 systemd[1]: session-7.scope: Deactivated successfully. Aug 13 00:56:15.354886 systemd-logind[1621]: Session 7 logged out. Waiting for processes to exit. Aug 13 00:56:15.355625 systemd-logind[1621]: Removed session 7. Aug 13 00:56:15.385591 kubelet[2014]: I0813 00:56:15.385554 2014 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Aug 13 00:56:15.385910 env[1633]: time="2025-08-13T00:56:15.385868675Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Aug 13 00:56:15.386225 kubelet[2014]: I0813 00:56:15.386116 2014 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Aug 13 00:56:16.230647 kubelet[2014]: I0813 00:56:16.230611 2014 apiserver.go:52] "Watching apiserver" Aug 13 00:56:16.230998 kubelet[2014]: E0813 00:56:16.230641 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:16.250841 kubelet[2014]: E0813 00:56:16.250803 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sp9ph" podUID="3d27de55-73cd-4e90-ae6f-fad3342847f4" Aug 13 00:56:16.256024 kubelet[2014]: I0813 00:56:16.255590 2014 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Aug 13 00:56:16.257384 systemd[1]: Created slice kubepods-besteffort-podaf0b0de2_7723_4e87_b03c_c87c5ad97026.slice. Aug 13 00:56:16.265507 systemd[1]: Created slice kubepods-besteffort-pod9b18a1d3_6d5f_4fae_9a78_a2207e40fd23.slice. Aug 13 00:56:16.267936 kubelet[2014]: I0813 00:56:16.267910 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pn94r\" (UniqueName: \"kubernetes.io/projected/3d27de55-73cd-4e90-ae6f-fad3342847f4-kube-api-access-pn94r\") pod \"csi-node-driver-sp9ph\" (UID: \"3d27de55-73cd-4e90-ae6f-fad3342847f4\") " pod="calico-system/csi-node-driver-sp9ph" Aug 13 00:56:16.268067 kubelet[2014]: I0813 00:56:16.268056 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/af0b0de2-7723-4e87-b03c-c87c5ad97026-lib-modules\") pod \"kube-proxy-rpj9z\" (UID: \"af0b0de2-7723-4e87-b03c-c87c5ad97026\") " pod="kube-system/kube-proxy-rpj9z" Aug 13 00:56:16.268127 kubelet[2014]: I0813 00:56:16.268118 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-xtables-lock\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268219 kubelet[2014]: I0813 00:56:16.268209 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3d27de55-73cd-4e90-ae6f-fad3342847f4-registration-dir\") pod \"csi-node-driver-sp9ph\" (UID: \"3d27de55-73cd-4e90-ae6f-fad3342847f4\") " pod="calico-system/csi-node-driver-sp9ph" Aug 13 00:56:16.268317 kubelet[2014]: I0813 00:56:16.268287 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3d27de55-73cd-4e90-ae6f-fad3342847f4-socket-dir\") pod \"csi-node-driver-sp9ph\" (UID: \"3d27de55-73cd-4e90-ae6f-fad3342847f4\") " pod="calico-system/csi-node-driver-sp9ph" Aug 13 00:56:16.268317 kubelet[2014]: I0813 00:56:16.268307 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-cni-log-dir\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268317 kubelet[2014]: I0813 00:56:16.268321 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-cni-net-dir\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268461 kubelet[2014]: I0813 00:56:16.268336 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-lib-modules\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268461 kubelet[2014]: I0813 00:56:16.268352 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-node-certs\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268461 kubelet[2014]: I0813 00:56:16.268368 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-policysync\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268461 kubelet[2014]: I0813 00:56:16.268382 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/af0b0de2-7723-4e87-b03c-c87c5ad97026-kube-proxy\") pod \"kube-proxy-rpj9z\" (UID: \"af0b0de2-7723-4e87-b03c-c87c5ad97026\") " pod="kube-system/kube-proxy-rpj9z" Aug 13 00:56:16.268461 kubelet[2014]: I0813 00:56:16.268402 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3d27de55-73cd-4e90-ae6f-fad3342847f4-kubelet-dir\") pod \"csi-node-driver-sp9ph\" (UID: \"3d27de55-73cd-4e90-ae6f-fad3342847f4\") " pod="calico-system/csi-node-driver-sp9ph" Aug 13 00:56:16.268579 kubelet[2014]: I0813 00:56:16.268419 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-285mg\" (UniqueName: \"kubernetes.io/projected/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-kube-api-access-285mg\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268579 kubelet[2014]: I0813 00:56:16.268434 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3d27de55-73cd-4e90-ae6f-fad3342847f4-varrun\") pod \"csi-node-driver-sp9ph\" (UID: \"3d27de55-73cd-4e90-ae6f-fad3342847f4\") " pod="calico-system/csi-node-driver-sp9ph" Aug 13 00:56:16.268579 kubelet[2014]: I0813 00:56:16.268448 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/af0b0de2-7723-4e87-b03c-c87c5ad97026-xtables-lock\") pod \"kube-proxy-rpj9z\" (UID: \"af0b0de2-7723-4e87-b03c-c87c5ad97026\") " pod="kube-system/kube-proxy-rpj9z" Aug 13 00:56:16.268579 kubelet[2014]: I0813 00:56:16.268463 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-cni-bin-dir\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268579 kubelet[2014]: I0813 00:56:16.268477 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-flexvol-driver-host\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268705 kubelet[2014]: I0813 00:56:16.268491 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-tigera-ca-bundle\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268705 kubelet[2014]: I0813 00:56:16.268505 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-var-lib-calico\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268705 kubelet[2014]: I0813 00:56:16.268519 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9b18a1d3-6d5f-4fae-9a78-a2207e40fd23-var-run-calico\") pod \"calico-node-dpflk\" (UID: \"9b18a1d3-6d5f-4fae-9a78-a2207e40fd23\") " pod="calico-system/calico-node-dpflk" Aug 13 00:56:16.268705 kubelet[2014]: I0813 00:56:16.268534 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvf4r\" (UniqueName: \"kubernetes.io/projected/af0b0de2-7723-4e87-b03c-c87c5ad97026-kube-api-access-rvf4r\") pod \"kube-proxy-rpj9z\" (UID: \"af0b0de2-7723-4e87-b03c-c87c5ad97026\") " pod="kube-system/kube-proxy-rpj9z" Aug 13 00:56:16.369697 kubelet[2014]: I0813 00:56:16.369660 2014 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Aug 13 00:56:16.373155 kubelet[2014]: E0813 00:56:16.373062 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:16.373155 kubelet[2014]: W0813 00:56:16.373082 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:16.373155 kubelet[2014]: E0813 00:56:16.373103 2014 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:16.402237 kubelet[2014]: E0813 00:56:16.402210 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:16.402237 kubelet[2014]: W0813 00:56:16.402231 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:16.402441 kubelet[2014]: E0813 00:56:16.402250 2014 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:16.417162 kubelet[2014]: E0813 00:56:16.417135 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:16.417162 kubelet[2014]: W0813 00:56:16.417157 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:16.417321 kubelet[2014]: E0813 00:56:16.417173 2014 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:16.420299 kubelet[2014]: E0813 00:56:16.420280 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:16.420420 kubelet[2014]: W0813 00:56:16.420408 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:16.420493 kubelet[2014]: E0813 00:56:16.420482 2014 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:16.564752 env[1633]: time="2025-08-13T00:56:16.564633162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rpj9z,Uid:af0b0de2-7723-4e87-b03c-c87c5ad97026,Namespace:kube-system,Attempt:0,}" Aug 13 00:56:16.569423 env[1633]: time="2025-08-13T00:56:16.569385893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dpflk,Uid:9b18a1d3-6d5f-4fae-9a78-a2207e40fd23,Namespace:calico-system,Attempt:0,}" Aug 13 00:56:17.056233 env[1633]: time="2025-08-13T00:56:17.056005136Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.057146 env[1633]: time="2025-08-13T00:56:17.057111641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.061892 env[1633]: time="2025-08-13T00:56:17.061846567Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.063094 env[1633]: time="2025-08-13T00:56:17.063065853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.063827 env[1633]: time="2025-08-13T00:56:17.063785609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.064383 env[1633]: time="2025-08-13T00:56:17.064358446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.066112 env[1633]: time="2025-08-13T00:56:17.066078025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.066912 env[1633]: time="2025-08-13T00:56:17.066886168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:17.087569 env[1633]: time="2025-08-13T00:56:17.086619571Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:17.087569 env[1633]: time="2025-08-13T00:56:17.086644403Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:17.087569 env[1633]: time="2025-08-13T00:56:17.086653929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:17.087569 env[1633]: time="2025-08-13T00:56:17.086781318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/801acfa6074243742fc7e9f0bcf9325b12a2ed331498ed649463b2a0446dcd36 pid=2080 runtime=io.containerd.runc.v2 Aug 13 00:56:17.087785 env[1633]: time="2025-08-13T00:56:17.085899502Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:17.087785 env[1633]: time="2025-08-13T00:56:17.085945786Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:17.087785 env[1633]: time="2025-08-13T00:56:17.085956496Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:17.087785 env[1633]: time="2025-08-13T00:56:17.086075442Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b pid=2077 runtime=io.containerd.runc.v2 Aug 13 00:56:17.099898 systemd[1]: Started cri-containerd-92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b.scope. Aug 13 00:56:17.109575 systemd[1]: Started cri-containerd-801acfa6074243742fc7e9f0bcf9325b12a2ed331498ed649463b2a0446dcd36.scope. Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.120842 kernel: kauditd_printk_skb: 276 callbacks suppressed Aug 13 00:56:17.120923 kernel: audit: type=1400 audit(1755046577.116:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.132354 kernel: audit: type=1400 audit(1755046577.116:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.139203 kernel: audit: type=1400 audit(1755046577.116:449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.161859 kernel: audit: type=1400 audit(1755046577.116:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.161967 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Aug 13 00:56:17.161987 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Aug 13 00:56:17.162003 kernel: audit: backlog limit exceeded Aug 13 00:56:17.162022 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Aug 13 00:56:17.162038 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Aug 13 00:56:17.162052 kernel: audit: backlog limit exceeded Aug 13 00:56:17.162067 env[1633]: time="2025-08-13T00:56:17.152638403Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dpflk,Uid:9b18a1d3-6d5f-4fae-9a78-a2207e40fd23,Namespace:calico-system,Attempt:0,} returns sandbox id \"92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b\"" Aug 13 00:56:17.162067 env[1633]: time="2025-08-13T00:56:17.154979081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.116000 audit: BPF prog-id=61 op=LOAD Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2077 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613263663866393065343238316238313136626239386164343161 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2077 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613263663866393065343238316238313136626239386164343161 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit: BPF prog-id=62 op=LOAD Aug 13 00:56:17.123000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003232c0 items=0 ppid=2077 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613263663866393065343238316238313136626239386164343161 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.123000 audit: BPF prog-id=63 op=LOAD Aug 13 00:56:17.123000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000323308 items=0 ppid=2077 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613263663866393065343238316238313136626239386164343161 Aug 13 00:56:17.124000 audit: BPF prog-id=63 op=UNLOAD Aug 13 00:56:17.124000 audit: BPF prog-id=62 op=UNLOAD Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.124000 audit: BPF prog-id=64 op=LOAD Aug 13 00:56:17.124000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000323718 items=0 ppid=2077 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613263663866393065343238316238313136626239386164343161 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2080 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316163666136303734323433373432666337653966306263663933 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2080 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316163666136303734323433373432666337653966306263663933 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit: BPF prog-id=66 op=LOAD Aug 13 00:56:17.163000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d2ab0 items=0 ppid=2080 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316163666136303734323433373432666337653966306263663933 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit: BPF prog-id=67 op=LOAD Aug 13 00:56:17.163000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d2af8 items=0 ppid=2080 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316163666136303734323433373432666337653966306263663933 Aug 13 00:56:17.163000 audit: BPF prog-id=67 op=UNLOAD Aug 13 00:56:17.163000 audit: BPF prog-id=66 op=UNLOAD Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:17.163000 audit: BPF prog-id=68 op=LOAD Aug 13 00:56:17.163000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d2f08 items=0 ppid=2080 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:17.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316163666136303734323433373432666337653966306263663933 Aug 13 00:56:17.178616 env[1633]: time="2025-08-13T00:56:17.178446034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rpj9z,Uid:af0b0de2-7723-4e87-b03c-c87c5ad97026,Namespace:kube-system,Attempt:0,} returns sandbox id \"801acfa6074243742fc7e9f0bcf9325b12a2ed331498ed649463b2a0446dcd36\"" Aug 13 00:56:17.231738 kubelet[2014]: E0813 00:56:17.231703 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:17.380265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount619978671.mount: Deactivated successfully. Aug 13 00:56:18.208679 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2509617014.mount: Deactivated successfully. Aug 13 00:56:18.232428 kubelet[2014]: E0813 00:56:18.232349 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:18.321225 env[1633]: time="2025-08-13T00:56:18.321141708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:18.323930 env[1633]: time="2025-08-13T00:56:18.323884895Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:18.325306 env[1633]: time="2025-08-13T00:56:18.325258909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:18.330101 env[1633]: time="2025-08-13T00:56:18.330062875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:18.330497 env[1633]: time="2025-08-13T00:56:18.330457420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Aug 13 00:56:18.332473 env[1633]: time="2025-08-13T00:56:18.332398182Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.7\"" Aug 13 00:56:18.333593 env[1633]: time="2025-08-13T00:56:18.333565172Z" level=info msg="CreateContainer within sandbox \"92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Aug 13 00:56:18.345733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1936380007.mount: Deactivated successfully. Aug 13 00:56:18.349656 env[1633]: time="2025-08-13T00:56:18.349617271Z" level=info msg="CreateContainer within sandbox \"92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d\"" Aug 13 00:56:18.350536 env[1633]: time="2025-08-13T00:56:18.350506110Z" level=info msg="StartContainer for \"3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d\"" Aug 13 00:56:18.366796 systemd[1]: Started cri-containerd-3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d.scope. Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbd9e312a18 items=0 ppid=2077 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:18.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366630383236323465386261386539386138663933636330666633 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit: BPF prog-id=69 op=LOAD Aug 13 00:56:18.381000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000dfba8 items=0 ppid=2077 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:18.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366630383236323465386261386539386138663933636330666633 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit: BPF prog-id=70 op=LOAD Aug 13 00:56:18.381000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000dfbf8 items=0 ppid=2077 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:18.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366630383236323465386261386539386138663933636330666633 Aug 13 00:56:18.381000 audit: BPF prog-id=70 op=UNLOAD Aug 13 00:56:18.381000 audit: BPF prog-id=69 op=UNLOAD Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:18.381000 audit: BPF prog-id=71 op=LOAD Aug 13 00:56:18.381000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000dfc88 items=0 ppid=2077 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:18.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366630383236323465386261386539386138663933636330666633 Aug 13 00:56:18.403836 env[1633]: time="2025-08-13T00:56:18.403789205Z" level=info msg="StartContainer for \"3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d\" returns successfully" Aug 13 00:56:18.406330 systemd[1]: cri-containerd-3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d.scope: Deactivated successfully. Aug 13 00:56:18.409000 audit: BPF prog-id=71 op=UNLOAD Aug 13 00:56:18.429266 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d-rootfs.mount: Deactivated successfully. Aug 13 00:56:18.467953 kubelet[2014]: E0813 00:56:18.467091 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sp9ph" podUID="3d27de55-73cd-4e90-ae6f-fad3342847f4" Aug 13 00:56:18.469968 env[1633]: time="2025-08-13T00:56:18.469924723Z" level=info msg="shim disconnected" id=3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d Aug 13 00:56:18.469968 env[1633]: time="2025-08-13T00:56:18.469964915Z" level=warning msg="cleaning up after shim disconnected" id=3d6f082624e8ba8e98a8f93cc0ff35fb2a7d4d08717d4ef6842a769611b9237d namespace=k8s.io Aug 13 00:56:18.469968 env[1633]: time="2025-08-13T00:56:18.469973811Z" level=info msg="cleaning up dead shim" Aug 13 00:56:18.480930 env[1633]: time="2025-08-13T00:56:18.480877824Z" level=warning msg="cleanup warnings time=\"2025-08-13T00:56:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2193 runtime=io.containerd.runc.v2\n" Aug 13 00:56:19.233040 kubelet[2014]: E0813 00:56:19.232945 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:19.372130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount756598378.mount: Deactivated successfully. Aug 13 00:56:20.040005 env[1633]: time="2025-08-13T00:56:20.039934549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:20.042000 env[1633]: time="2025-08-13T00:56:20.041956511Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5bc66d8682fdab0735e869a3f77730df378af7fd2505c1f4d6374ad3dbd181c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:20.043645 env[1633]: time="2025-08-13T00:56:20.043610182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:20.045023 env[1633]: time="2025-08-13T00:56:20.044987018Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8d589a18b5424f77a784ef2f00feffac0ef210414100822f1c120f0d7221def3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:20.045778 env[1633]: time="2025-08-13T00:56:20.045730162Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.7\" returns image reference \"sha256:d5bc66d8682fdab0735e869a3f77730df378af7fd2505c1f4d6374ad3dbd181c\"" Aug 13 00:56:20.047205 env[1633]: time="2025-08-13T00:56:20.047144692Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Aug 13 00:56:20.048397 env[1633]: time="2025-08-13T00:56:20.048363818Z" level=info msg="CreateContainer within sandbox \"801acfa6074243742fc7e9f0bcf9325b12a2ed331498ed649463b2a0446dcd36\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Aug 13 00:56:20.061803 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3575101051.mount: Deactivated successfully. Aug 13 00:56:20.074265 env[1633]: time="2025-08-13T00:56:20.074215342Z" level=info msg="CreateContainer within sandbox \"801acfa6074243742fc7e9f0bcf9325b12a2ed331498ed649463b2a0446dcd36\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4e6fd8d0ef957c0a5b0c2b7f17ebf37dfa4498cd185df766ee00d44b91d74d3d\"" Aug 13 00:56:20.074919 env[1633]: time="2025-08-13T00:56:20.074883169Z" level=info msg="StartContainer for \"4e6fd8d0ef957c0a5b0c2b7f17ebf37dfa4498cd185df766ee00d44b91d74d3d\"" Aug 13 00:56:20.098041 systemd[1]: Started cri-containerd-4e6fd8d0ef957c0a5b0c2b7f17ebf37dfa4498cd185df766ee00d44b91d74d3d.scope. Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001216b0 a2=3c a3=7fa3fee279b8 items=0 ppid=2080 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465366664386430656639353763306135623063326237663137656266 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.116000 audit: BPF prog-id=72 op=LOAD Aug 13 00:56:20.116000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001219d8 a2=78 a3=c000218c58 items=0 ppid=2080 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465366664386430656639353763306135623063326237663137656266 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.117000 audit: BPF prog-id=73 op=LOAD Aug 13 00:56:20.117000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000121770 a2=78 a3=c000218ca8 items=0 ppid=2080 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465366664386430656639353763306135623063326237663137656266 Aug 13 00:56:20.117000 audit: BPF prog-id=73 op=UNLOAD Aug 13 00:56:20.118000 audit: BPF prog-id=72 op=UNLOAD Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:20.118000 audit: BPF prog-id=74 op=LOAD Aug 13 00:56:20.118000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000121c30 a2=78 a3=c000218d38 items=0 ppid=2080 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465366664386430656639353763306135623063326237663137656266 Aug 13 00:56:20.135972 env[1633]: time="2025-08-13T00:56:20.135898532Z" level=info msg="StartContainer for \"4e6fd8d0ef957c0a5b0c2b7f17ebf37dfa4498cd185df766ee00d44b91d74d3d\" returns successfully" Aug 13 00:56:20.234114 kubelet[2014]: E0813 00:56:20.234023 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:20.291000 audit[2276]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.291000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff00e3d6d0 a2=0 a3=7fff00e3d6bc items=0 ppid=2229 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 00:56:20.292000 audit[2275]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.292000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe404920a0 a2=0 a3=7ffe4049208c items=0 ppid=2229 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 00:56:20.293000 audit[2280]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.293000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea0d664f0 a2=0 a3=7ffea0d664dc items=0 ppid=2229 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 00:56:20.294000 audit[2281]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.294000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1b2d2500 a2=0 a3=7ffe1b2d24ec items=0 ppid=2229 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 00:56:20.295000 audit[2283]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.295000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc4157a80 a2=0 a3=7fffc4157a6c items=0 ppid=2229 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 00:56:20.295000 audit[2282]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.295000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd56121a10 a2=0 a3=7ffd561219fc items=0 ppid=2229 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 00:56:20.393000 audit[2284]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.393000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdabb386e0 a2=0 a3=7ffdabb386cc items=0 ppid=2229 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 00:56:20.396000 audit[2286]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.396000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd66af1240 a2=0 a3=7ffd66af122c items=0 ppid=2229 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Aug 13 00:56:20.400000 audit[2289]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.400000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd926606e0 a2=0 a3=7ffd926606cc items=0 ppid=2229 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Aug 13 00:56:20.402000 audit[2290]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.402000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd99233760 a2=0 a3=7ffd9923374c items=0 ppid=2229 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 00:56:20.404000 audit[2292]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.404000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8f7a43c0 a2=0 a3=7fff8f7a43ac items=0 ppid=2229 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 00:56:20.406000 audit[2293]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.406000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd17a04c0 a2=0 a3=7fffd17a04ac items=0 ppid=2229 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 00:56:20.409000 audit[2295]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.409000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeef3cef70 a2=0 a3=7ffeef3cef5c items=0 ppid=2229 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 00:56:20.413000 audit[2298]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.413000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3a17df20 a2=0 a3=7fff3a17df0c items=0 ppid=2229 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Aug 13 00:56:20.414000 audit[2299]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.414000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe15c913c0 a2=0 a3=7ffe15c913ac items=0 ppid=2229 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 00:56:20.417000 audit[2301]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.417000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf4ca8730 a2=0 a3=7ffdf4ca871c items=0 ppid=2229 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 00:56:20.418000 audit[2302]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.418000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9f723220 a2=0 a3=7ffc9f72320c items=0 ppid=2229 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 00:56:20.421000 audit[2304]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.421000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe52530b0 a2=0 a3=7fffe525309c items=0 ppid=2229 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:56:20.425000 audit[2307]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.425000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc69140e30 a2=0 a3=7ffc69140e1c items=0 ppid=2229 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:56:20.429000 audit[2310]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.429000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0ea71c30 a2=0 a3=7fff0ea71c1c items=0 ppid=2229 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 00:56:20.431000 audit[2311]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.431000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6a4c2e00 a2=0 a3=7fff6a4c2dec items=0 ppid=2229 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 00:56:20.468258 kubelet[2014]: E0813 00:56:20.466905 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sp9ph" podUID="3d27de55-73cd-4e90-ae6f-fad3342847f4" Aug 13 00:56:20.433000 audit[2313]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.433000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe4855e140 a2=0 a3=7ffe4855e12c items=0 ppid=2229 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:20.472000 audit[2317]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.472000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeb06d2740 a2=0 a3=7ffeb06d272c items=0 ppid=2229 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:20.473000 audit[2318]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.473000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc40f7960 a2=0 a3=7ffcc40f794c items=0 ppid=2229 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 00:56:20.476000 audit[2320]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:20.476000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd40764090 a2=0 a3=7ffd4076407c items=0 ppid=2229 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 00:56:20.517000 audit[2326]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:20.517000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe723d8bc0 a2=0 a3=7ffe723d8bac items=0 ppid=2229 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:20.539000 audit[2326]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:20.539000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffe723d8bc0 a2=0 a3=7ffe723d8bac items=0 ppid=2229 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.539000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:20.541000 audit[2333]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.541000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffa5ef1040 a2=0 a3=7fffa5ef102c items=0 ppid=2229 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 00:56:20.544000 audit[2335]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.544000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff24669400 a2=0 a3=7fff246693ec items=0 ppid=2229 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Aug 13 00:56:20.550000 audit[2338]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.550000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffea51fd140 a2=0 a3=7ffea51fd12c items=0 ppid=2229 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Aug 13 00:56:20.552000 audit[2339]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.552000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5eacccc0 a2=0 a3=7ffc5eacccac items=0 ppid=2229 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 00:56:20.555000 audit[2341]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.555000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd91d860e0 a2=0 a3=7ffd91d860cc items=0 ppid=2229 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 00:56:20.556000 audit[2342]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.556000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd63fe79d0 a2=0 a3=7ffd63fe79bc items=0 ppid=2229 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 00:56:20.559000 audit[2344]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.559000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee4d454d0 a2=0 a3=7ffee4d454bc items=0 ppid=2229 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Aug 13 00:56:20.563000 audit[2347]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.563000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffda60c5530 a2=0 a3=7ffda60c551c items=0 ppid=2229 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 00:56:20.564000 audit[2348]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.564000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff571b3630 a2=0 a3=7fff571b361c items=0 ppid=2229 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 00:56:20.567000 audit[2350]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.567000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc78fcacd0 a2=0 a3=7ffc78fcacbc items=0 ppid=2229 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 00:56:20.568000 audit[2351]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.568000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb650d250 a2=0 a3=7ffeb650d23c items=0 ppid=2229 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 00:56:20.571000 audit[2353]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.571000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe66cacc00 a2=0 a3=7ffe66cacbec items=0 ppid=2229 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:56:20.575000 audit[2356]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.575000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb7369210 a2=0 a3=7ffcb73691fc items=0 ppid=2229 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 00:56:20.580000 audit[2359]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.580000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa68159d0 a2=0 a3=7fffa68159bc items=0 ppid=2229 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Aug 13 00:56:20.581000 audit[2360]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.581000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe536458c0 a2=0 a3=7ffe536458ac items=0 ppid=2229 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 00:56:20.584000 audit[2362]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.584000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffed3d0f950 a2=0 a3=7ffed3d0f93c items=0 ppid=2229 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:20.589000 audit[2365]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.589000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffee4f1ef10 a2=0 a3=7ffee4f1eefc items=0 ppid=2229 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:20.590000 audit[2366]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.590000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd46a891d0 a2=0 a3=7ffd46a891bc items=0 ppid=2229 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 00:56:20.592000 audit[2368]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.592000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffc6b0c970 a2=0 a3=7fffc6b0c95c items=0 ppid=2229 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 00:56:20.594000 audit[2369]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.594000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc83a054a0 a2=0 a3=7ffc83a0548c items=0 ppid=2229 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 00:56:20.597000 audit[2371]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.597000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9d09bfd0 a2=0 a3=7ffe9d09bfbc items=0 ppid=2229 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:20.601000 audit[2374]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:20.601000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8a7afdb0 a2=0 a3=7ffc8a7afd9c items=0 ppid=2229 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:20.604000 audit[2376]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 00:56:20.604000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdb17725b0 a2=0 a3=7ffdb177259c items=0 ppid=2229 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.604000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:20.605000 audit[2376]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 00:56:20.605000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdb17725b0 a2=0 a3=7ffdb177259c items=0 ppid=2229 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.605000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:20.650000 audit[2378]: NETFILTER_CFG table=filter:65 family=2 entries=20 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:20.650000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff567a1710 a2=0 a3=7fff567a16fc items=0 ppid=2229 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:20.656000 audit[2378]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:20.656000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff567a1710 a2=0 a3=0 items=0 ppid=2229 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:20.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:21.062728 systemd[1]: run-containerd-runc-k8s.io-4e6fd8d0ef957c0a5b0c2b7f17ebf37dfa4498cd185df766ee00d44b91d74d3d-runc.fZHbuj.mount: Deactivated successfully. Aug 13 00:56:21.234716 kubelet[2014]: E0813 00:56:21.234656 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:21.568000 audit[2381]: NETFILTER_CFG table=filter:67 family=2 entries=17 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:21.568000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe2a98bdb0 a2=0 a3=7ffe2a98bd9c items=0 ppid=2229 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:21.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:21.573000 audit[2381]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:21.573000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe2a98bdb0 a2=0 a3=7ffe2a98bd9c items=0 ppid=2229 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:21.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:22.235410 kubelet[2014]: E0813 00:56:22.235361 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:22.469394 kubelet[2014]: E0813 00:56:22.468440 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sp9ph" podUID="3d27de55-73cd-4e90-ae6f-fad3342847f4" Aug 13 00:56:22.597933 kernel: kauditd_printk_skb: 362 callbacks suppressed Aug 13 00:56:22.598086 kernel: audit: type=1325 audit(1755046582.588:548): table=filter:69 family=2 entries=14 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:22.588000 audit[2383]: NETFILTER_CFG table=filter:69 family=2 entries=14 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:22.588000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcca1b1bf0 a2=0 a3=7ffcca1b1bdc items=0 ppid=2229 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:22.616706 kernel: audit: type=1300 audit(1755046582.588:548): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcca1b1bf0 a2=0 a3=7ffcca1b1bdc items=0 ppid=2229 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:22.616844 kernel: audit: type=1327 audit(1755046582.588:548): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:22.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:22.624000 audit[2383]: NETFILTER_CFG table=nat:70 family=2 entries=56 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:22.631339 kernel: audit: type=1325 audit(1755046582.624:549): table=nat:70 family=2 entries=56 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:22.624000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcca1b1bf0 a2=0 a3=7ffcca1b1bdc items=0 ppid=2229 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:22.643372 kernel: audit: type=1300 audit(1755046582.624:549): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcca1b1bf0 a2=0 a3=7ffcca1b1bdc items=0 ppid=2229 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:22.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:22.654212 kernel: audit: type=1327 audit(1755046582.624:549): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:23.080732 env[1633]: time="2025-08-13T00:56:23.080366434Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:23.082679 env[1633]: time="2025-08-13T00:56:23.082639471Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:23.084653 env[1633]: time="2025-08-13T00:56:23.084623906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:23.086340 env[1633]: time="2025-08-13T00:56:23.086312020Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:23.086763 env[1633]: time="2025-08-13T00:56:23.086731836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Aug 13 00:56:23.088803 env[1633]: time="2025-08-13T00:56:23.088767494Z" level=info msg="CreateContainer within sandbox \"92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Aug 13 00:56:23.105255 env[1633]: time="2025-08-13T00:56:23.105177780Z" level=info msg="CreateContainer within sandbox \"92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c\"" Aug 13 00:56:23.105992 env[1633]: time="2025-08-13T00:56:23.105927171Z" level=info msg="StartContainer for \"9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c\"" Aug 13 00:56:23.135673 systemd[1]: run-containerd-runc-k8s.io-9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c-runc.Z9iVid.mount: Deactivated successfully. Aug 13 00:56:23.141926 systemd[1]: Started cri-containerd-9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c.scope. Aug 13 00:56:23.158000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.158000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9672f22b18 items=0 ppid=2077 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:23.174210 kernel: audit: type=1400 audit(1755046583.158:550): avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.174365 kernel: audit: type=1300 audit(1755046583.158:550): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9672f22b18 items=0 ppid=2077 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:23.174400 kernel: audit: type=1327 audit(1755046583.158:550): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966333430616363626536316666633466313165306234326336356333 Aug 13 00:56:23.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966333430616363626536316666633466313165306234326336356333 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.189076 kernel: audit: type=1400 audit(1755046583.159:551): avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.159000 audit: BPF prog-id=75 op=LOAD Aug 13 00:56:23.159000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028b608 items=0 ppid=2077 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:23.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966333430616363626536316666633466313165306234326336356333 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.165000 audit: BPF prog-id=76 op=LOAD Aug 13 00:56:23.165000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028b658 items=0 ppid=2077 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:23.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966333430616363626536316666633466313165306234326336356333 Aug 13 00:56:23.182000 audit: BPF prog-id=76 op=UNLOAD Aug 13 00:56:23.182000 audit: BPF prog-id=75 op=UNLOAD Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:23.182000 audit: BPF prog-id=77 op=LOAD Aug 13 00:56:23.182000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028b6e8 items=0 ppid=2077 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:23.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966333430616363626536316666633466313165306234326336356333 Aug 13 00:56:23.207525 env[1633]: time="2025-08-13T00:56:23.207379423Z" level=info msg="StartContainer for \"9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c\" returns successfully" Aug 13 00:56:23.236112 kubelet[2014]: E0813 00:56:23.236040 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:23.529571 kubelet[2014]: I0813 00:56:23.529455 2014 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rpj9z" podStartSLOduration=6.662245969 podStartE2EDuration="9.529441247s" podCreationTimestamp="2025-08-13 00:56:14 +0000 UTC" firstStartedPulling="2025-08-13 00:56:17.179696295 +0000 UTC m=+3.397450389" lastFinishedPulling="2025-08-13 00:56:20.046891553 +0000 UTC m=+6.264645667" observedRunningTime="2025-08-13 00:56:20.536520209 +0000 UTC m=+6.754274325" watchObservedRunningTime="2025-08-13 00:56:23.529441247 +0000 UTC m=+9.747195362" Aug 13 00:56:23.656000 audit[2420]: NETFILTER_CFG table=filter:71 family=2 entries=14 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:23.656000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc4cbb22a0 a2=0 a3=7ffc4cbb228c items=0 ppid=2229 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:23.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:23.661000 audit[2420]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:23.661000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc4cbb22a0 a2=0 a3=7ffc4cbb228c items=0 ppid=2229 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:23.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:23.763784 env[1633]: time="2025-08-13T00:56:23.763720336Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 00:56:23.765370 systemd[1]: cri-containerd-9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c.scope: Deactivated successfully. Aug 13 00:56:23.768779 kubelet[2014]: I0813 00:56:23.768760 2014 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Aug 13 00:56:23.770000 audit: BPF prog-id=77 op=UNLOAD Aug 13 00:56:24.098399 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c-rootfs.mount: Deactivated successfully. Aug 13 00:56:24.236848 kubelet[2014]: E0813 00:56:24.236815 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:24.473367 systemd[1]: Created slice kubepods-besteffort-pod3d27de55_73cd_4e90_ae6f_fad3342847f4.slice. Aug 13 00:56:24.476421 env[1633]: time="2025-08-13T00:56:24.476383895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sp9ph,Uid:3d27de55-73cd-4e90-ae6f-fad3342847f4,Namespace:calico-system,Attempt:0,}" Aug 13 00:56:24.557110 env[1633]: time="2025-08-13T00:56:24.556464389Z" level=info msg="shim disconnected" id=9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c Aug 13 00:56:24.557311 env[1633]: time="2025-08-13T00:56:24.557116492Z" level=warning msg="cleaning up after shim disconnected" id=9f340accbe61ffc4f11e0b42c65c33fdef738e28a7d0108cf275c48657fe2e3c namespace=k8s.io Aug 13 00:56:24.557311 env[1633]: time="2025-08-13T00:56:24.557134397Z" level=info msg="cleaning up dead shim" Aug 13 00:56:24.572616 env[1633]: time="2025-08-13T00:56:24.572557776Z" level=warning msg="cleanup warnings time=\"2025-08-13T00:56:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2433 runtime=io.containerd.runc.v2\n" Aug 13 00:56:24.621209 env[1633]: time="2025-08-13T00:56:24.621123024Z" level=error msg="Failed to destroy network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:24.623472 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302-shm.mount: Deactivated successfully. Aug 13 00:56:24.624592 env[1633]: time="2025-08-13T00:56:24.624534562Z" level=error msg="encountered an error cleaning up failed sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:24.624824 env[1633]: time="2025-08-13T00:56:24.624776021Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sp9ph,Uid:3d27de55-73cd-4e90-ae6f-fad3342847f4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:24.625244 kubelet[2014]: E0813 00:56:24.625160 2014 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:24.625343 kubelet[2014]: E0813 00:56:24.625298 2014 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sp9ph" Aug 13 00:56:24.625395 kubelet[2014]: E0813 00:56:24.625349 2014 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sp9ph" Aug 13 00:56:24.625669 kubelet[2014]: E0813 00:56:24.625442 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-sp9ph_calico-system(3d27de55-73cd-4e90-ae6f-fad3342847f4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-sp9ph_calico-system(3d27de55-73cd-4e90-ae6f-fad3342847f4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sp9ph" podUID="3d27de55-73cd-4e90-ae6f-fad3342847f4" Aug 13 00:56:25.092000 audit[2474]: NETFILTER_CFG table=filter:73 family=2 entries=13 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:25.092000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffb31ac390 a2=0 a3=7fffb31ac37c items=0 ppid=2229 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:25.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:25.097000 audit[2474]: NETFILTER_CFG table=nat:74 family=2 entries=27 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:25.097000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffb31ac390 a2=0 a3=7fffb31ac37c items=0 ppid=2229 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:25.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:25.237488 kubelet[2014]: E0813 00:56:25.237431 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:25.501270 kubelet[2014]: I0813 00:56:25.501165 2014 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:56:25.501945 env[1633]: time="2025-08-13T00:56:25.501912111Z" level=info msg="StopPodSandbox for \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\"" Aug 13 00:56:25.502340 env[1633]: time="2025-08-13T00:56:25.502311394Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Aug 13 00:56:25.526074 env[1633]: time="2025-08-13T00:56:25.525934455Z" level=error msg="StopPodSandbox for \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\" failed" error="failed to destroy network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:25.526218 kubelet[2014]: E0813 00:56:25.526148 2014 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:56:25.526287 kubelet[2014]: E0813 00:56:25.526221 2014 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302"} Aug 13 00:56:25.526287 kubelet[2014]: E0813 00:56:25.526274 2014 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d27de55-73cd-4e90-ae6f-fad3342847f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 00:56:25.526382 kubelet[2014]: E0813 00:56:25.526295 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d27de55-73cd-4e90-ae6f-fad3342847f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sp9ph" podUID="3d27de55-73cd-4e90-ae6f-fad3342847f4" Aug 13 00:56:26.238476 kubelet[2014]: E0813 00:56:26.238433 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:27.238819 kubelet[2014]: E0813 00:56:27.238748 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:28.239489 kubelet[2014]: E0813 00:56:28.239420 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:28.751212 kernel: kauditd_printk_skb: 52 callbacks suppressed Aug 13 00:56:28.751376 kernel: audit: type=1325 audit(1755046588.741:561): table=filter:75 family=2 entries=12 op=nft_register_rule pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:28.741000 audit[2491]: NETFILTER_CFG table=filter:75 family=2 entries=12 op=nft_register_rule pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:28.741000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffc9008020 a2=0 a3=7fffc900800c items=0 ppid=2229 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.772045 kernel: audit: type=1300 audit(1755046588.741:561): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffc9008020 a2=0 a3=7fffc900800c items=0 ppid=2229 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.772167 kernel: audit: type=1327 audit(1755046588.741:561): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:28.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:28.770000 audit[2491]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:28.782264 kernel: audit: type=1325 audit(1755046588.770:562): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:28.770000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc9008020 a2=0 a3=7fffc900800c items=0 ppid=2229 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.795211 kernel: audit: type=1300 audit(1755046588.770:562): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc9008020 a2=0 a3=7fffc900800c items=0 ppid=2229 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:28.802214 kernel: audit: type=1327 audit(1755046588.770:562): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:29.241359 kubelet[2014]: E0813 00:56:29.240567 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:30.207799 systemd[1]: Created slice kubepods-besteffort-pod72a4d4d7_e528_4079_870c_844a5f57dae1.slice. Aug 13 00:56:30.241294 kubelet[2014]: E0813 00:56:30.241251 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:30.273062 kubelet[2014]: I0813 00:56:30.273022 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9gss\" (UniqueName: \"kubernetes.io/projected/72a4d4d7-e528-4079-870c-844a5f57dae1-kube-api-access-v9gss\") pod \"nginx-deployment-7fcdb87857-t42ts\" (UID: \"72a4d4d7-e528-4079-870c-844a5f57dae1\") " pod="default/nginx-deployment-7fcdb87857-t42ts" Aug 13 00:56:30.513501 env[1633]: time="2025-08-13T00:56:30.512929691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t42ts,Uid:72a4d4d7-e528-4079-870c-844a5f57dae1,Namespace:default,Attempt:0,}" Aug 13 00:56:30.656677 env[1633]: time="2025-08-13T00:56:30.656610539Z" level=error msg="Failed to destroy network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:30.661417 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093-shm.mount: Deactivated successfully. Aug 13 00:56:30.663277 env[1633]: time="2025-08-13T00:56:30.663217464Z" level=error msg="encountered an error cleaning up failed sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:30.663384 env[1633]: time="2025-08-13T00:56:30.663301624Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t42ts,Uid:72a4d4d7-e528-4079-870c-844a5f57dae1,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:30.663582 kubelet[2014]: E0813 00:56:30.663539 2014 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:30.663661 kubelet[2014]: E0813 00:56:30.663608 2014 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-t42ts" Aug 13 00:56:30.663661 kubelet[2014]: E0813 00:56:30.663641 2014 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-t42ts" Aug 13 00:56:30.663750 kubelet[2014]: E0813 00:56:30.663698 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-t42ts_default(72a4d4d7-e528-4079-870c-844a5f57dae1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-t42ts_default(72a4d4d7-e528-4079-870c-844a5f57dae1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-t42ts" podUID="72a4d4d7-e528-4079-870c-844a5f57dae1" Aug 13 00:56:30.983000 audit[2522]: NETFILTER_CFG table=filter:77 family=2 entries=11 op=nft_register_rule pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:30.990383 kernel: audit: type=1325 audit(1755046590.983:563): table=filter:77 family=2 entries=11 op=nft_register_rule pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:30.983000 audit[2522]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffddc5835f0 a2=0 a3=7ffddc5835dc items=0 ppid=2229 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:31.009033 kernel: audit: type=1300 audit(1755046590.983:563): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffddc5835f0 a2=0 a3=7ffddc5835dc items=0 ppid=2229 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:31.009171 kernel: audit: type=1327 audit(1755046590.983:563): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:30.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:31.010000 audit[2522]: NETFILTER_CFG table=nat:78 family=2 entries=29 op=nft_register_chain pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:31.010000 audit[2522]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffddc5835f0 a2=0 a3=7ffddc5835dc items=0 ppid=2229 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:31.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:31.017298 kernel: audit: type=1325 audit(1755046591.010:564): table=nat:78 family=2 entries=29 op=nft_register_chain pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:31.242101 kubelet[2014]: E0813 00:56:31.241997 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:31.512347 kubelet[2014]: I0813 00:56:31.511711 2014 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:56:31.513126 env[1633]: time="2025-08-13T00:56:31.513082442Z" level=info msg="StopPodSandbox for \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\"" Aug 13 00:56:31.572470 env[1633]: time="2025-08-13T00:56:31.572402076Z" level=error msg="StopPodSandbox for \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\" failed" error="failed to destroy network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:31.572889 kubelet[2014]: E0813 00:56:31.572659 2014 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:56:31.572889 kubelet[2014]: E0813 00:56:31.572715 2014 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093"} Aug 13 00:56:31.572889 kubelet[2014]: E0813 00:56:31.572761 2014 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"72a4d4d7-e528-4079-870c-844a5f57dae1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 00:56:31.572889 kubelet[2014]: E0813 00:56:31.572797 2014 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"72a4d4d7-e528-4079-870c-844a5f57dae1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-t42ts" podUID="72a4d4d7-e528-4079-870c-844a5f57dae1" Aug 13 00:56:31.674391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount307143.mount: Deactivated successfully. Aug 13 00:56:31.740268 env[1633]: time="2025-08-13T00:56:31.740214467Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:31.752488 env[1633]: time="2025-08-13T00:56:31.752443319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:31.760246 env[1633]: time="2025-08-13T00:56:31.760202220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:31.763943 env[1633]: time="2025-08-13T00:56:31.763352819Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:31.764261 env[1633]: time="2025-08-13T00:56:31.763901012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Aug 13 00:56:31.782390 env[1633]: time="2025-08-13T00:56:31.782347669Z" level=info msg="CreateContainer within sandbox \"92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Aug 13 00:56:31.796981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1665153818.mount: Deactivated successfully. Aug 13 00:56:31.801756 env[1633]: time="2025-08-13T00:56:31.801703368Z" level=info msg="CreateContainer within sandbox \"92a2cf8f90e4281b8116bb98ad41ab75c65bc796192c5feba0c00199f691790b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"61fcf59e693bb4d36edb9617f39f1e41a0c9c47802d40bf970ef769c92fce916\"" Aug 13 00:56:31.802284 env[1633]: time="2025-08-13T00:56:31.802252211Z" level=info msg="StartContainer for \"61fcf59e693bb4d36edb9617f39f1e41a0c9c47802d40bf970ef769c92fce916\"" Aug 13 00:56:31.818090 systemd[1]: Started cri-containerd-61fcf59e693bb4d36edb9617f39f1e41a0c9c47802d40bf970ef769c92fce916.scope. Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7f4c0d3a88 items=0 ppid=2077 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666366353965363933626234643336656462393631376633396631 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit: BPF prog-id=78 op=LOAD Aug 13 00:56:31.840000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00029a208 items=0 ppid=2077 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666366353965363933626234643336656462393631376633396631 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit: BPF prog-id=79 op=LOAD Aug 13 00:56:31.840000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00029a258 items=0 ppid=2077 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666366353965363933626234643336656462393631376633396631 Aug 13 00:56:31.840000 audit: BPF prog-id=79 op=UNLOAD Aug 13 00:56:31.840000 audit: BPF prog-id=78 op=UNLOAD Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:31.840000 audit: BPF prog-id=80 op=LOAD Aug 13 00:56:31.840000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00029a2e8 items=0 ppid=2077 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666366353965363933626234643336656462393631376633396631 Aug 13 00:56:31.856945 env[1633]: time="2025-08-13T00:56:31.856908596Z" level=info msg="StartContainer for \"61fcf59e693bb4d36edb9617f39f1e41a0c9c47802d40bf970ef769c92fce916\" returns successfully" Aug 13 00:56:31.962441 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Aug 13 00:56:31.962648 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Aug 13 00:56:32.242677 kubelet[2014]: E0813 00:56:32.242546 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:32.552219 kubelet[2014]: I0813 00:56:32.551800 2014 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dpflk" podStartSLOduration=3.940982481 podStartE2EDuration="18.551782478s" podCreationTimestamp="2025-08-13 00:56:14 +0000 UTC" firstStartedPulling="2025-08-13 00:56:17.15442032 +0000 UTC m=+3.372174417" lastFinishedPulling="2025-08-13 00:56:31.765220315 +0000 UTC m=+17.982974414" observedRunningTime="2025-08-13 00:56:32.546482516 +0000 UTC m=+18.764236631" watchObservedRunningTime="2025-08-13 00:56:32.551782478 +0000 UTC m=+18.769536575" Aug 13 00:56:33.243325 kubelet[2014]: E0813 00:56:33.243265 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:33.309000 audit[2661]: AVC avc: denied { write } for pid=2661 comm="tee" name="fd" dev="proc" ino=19202 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:33.309000 audit[2661]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed06457e8 a2=241 a3=1b6 items=1 ppid=2640 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.309000 audit: CWD cwd="/etc/service/enabled/confd/log" Aug 13 00:56:33.309000 audit: PATH item=0 name="/dev/fd/63" inode=19193 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:33.309000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:33.321000 audit[2677]: AVC avc: denied { write } for pid=2677 comm="tee" name="fd" dev="proc" ino=19220 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:33.321000 audit[2677]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd580427ea a2=241 a3=1b6 items=1 ppid=2638 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.321000 audit: CWD cwd="/etc/service/enabled/cni/log" Aug 13 00:56:33.321000 audit: PATH item=0 name="/dev/fd/63" inode=19215 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:33.321000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:33.324000 audit[2673]: AVC avc: denied { write } for pid=2673 comm="tee" name="fd" dev="proc" ino=20170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:33.324000 audit[2673]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7c69d7e8 a2=241 a3=1b6 items=1 ppid=2643 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.324000 audit: CWD cwd="/etc/service/enabled/felix/log" Aug 13 00:56:33.324000 audit: PATH item=0 name="/dev/fd/63" inode=19209 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:33.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:33.329000 audit[2675]: AVC avc: denied { write } for pid=2675 comm="tee" name="fd" dev="proc" ino=20176 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:33.329000 audit[2675]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff38f6c7e8 a2=241 a3=1b6 items=1 ppid=2646 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.329000 audit: CWD cwd="/etc/service/enabled/bird6/log" Aug 13 00:56:33.329000 audit: PATH item=0 name="/dev/fd/63" inode=19212 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:33.329000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:33.336000 audit[2671]: AVC avc: denied { write } for pid=2671 comm="tee" name="fd" dev="proc" ino=20180 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:33.336000 audit[2671]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc82acd7e9 a2=241 a3=1b6 items=1 ppid=2642 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.336000 audit: CWD cwd="/etc/service/enabled/bird/log" Aug 13 00:56:33.336000 audit: PATH item=0 name="/dev/fd/63" inode=19206 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:33.336000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:33.346000 audit[2703]: AVC avc: denied { write } for pid=2703 comm="tee" name="fd" dev="proc" ino=20191 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:33.346000 audit[2703]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc8be67d9 a2=241 a3=1b6 items=1 ppid=2651 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.346000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Aug 13 00:56:33.346000 audit: PATH item=0 name="/dev/fd/63" inode=20186 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:33.346000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:33.353000 audit[2705]: AVC avc: denied { write } for pid=2705 comm="tee" name="fd" dev="proc" ino=20196 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:33.353000 audit[2705]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd73bd77d8 a2=241 a3=1b6 items=1 ppid=2653 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.353000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Aug 13 00:56:33.353000 audit: PATH item=0 name="/dev/fd/63" inode=20188 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:33.353000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit: BPF prog-id=81 op=LOAD Aug 13 00:56:33.650000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc513dfd20 a2=98 a3=1fffffffffffffff items=0 ppid=2645 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.650000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:33.650000 audit: BPF prog-id=81 op=UNLOAD Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit: BPF prog-id=82 op=LOAD Aug 13 00:56:33.650000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc513dfc00 a2=94 a3=3 items=0 ppid=2645 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.650000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:33.650000 audit: BPF prog-id=82 op=UNLOAD Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit: BPF prog-id=83 op=LOAD Aug 13 00:56:33.650000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc513dfc40 a2=94 a3=7ffc513dfe20 items=0 ppid=2645 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.650000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:33.650000 audit: BPF prog-id=83 op=UNLOAD Aug 13 00:56:33.650000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.650000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc513dfd10 a2=50 a3=a000000085 items=0 ppid=2645 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.650000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit: BPF prog-id=84 op=LOAD Aug 13 00:56:33.653000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1becae30 a2=98 a3=3 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.653000 audit: BPF prog-id=84 op=UNLOAD Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit: BPF prog-id=85 op=LOAD Aug 13 00:56:33.653000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1becac20 a2=94 a3=54428f items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.653000 audit: BPF prog-id=85 op=UNLOAD Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.653000 audit: BPF prog-id=86 op=LOAD Aug 13 00:56:33.653000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1becac50 a2=94 a3=2 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.653000 audit: BPF prog-id=86 op=UNLOAD Aug 13 00:56:33.798774 kernel: kauditd_printk_skb: 161 callbacks suppressed Aug 13 00:56:33.798935 kernel: audit: type=1400 audit(1755046593.789:591): avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.815745 kernel: audit: type=1400 audit(1755046593.789:591): avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.815858 kernel: audit: type=1400 audit(1755046593.789:591): avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.815972 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.824323 kernel: audit: type=1400 audit(1755046593.789:591): avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.824459 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.832776 kernel: audit: type=1400 audit(1755046593.789:591): avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.832905 kernel: audit: backlog limit exceeded Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.840773 kernel: audit: type=1400 audit(1755046593.789:591): avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.840917 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.789000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.789000 audit: BPF prog-id=87 op=LOAD Aug 13 00:56:33.789000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1becab10 a2=94 a3=1 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.797000 audit: BPF prog-id=87 op=UNLOAD Aug 13 00:56:33.797000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.797000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe1becabe0 a2=50 a3=7ffe1becacc0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.797000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1becab20 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1becab50 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1becaa60 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1becab70 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1becab50 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1becab40 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1becab70 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1becab50 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1becab70 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1becab40 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1becabb0 a2=28 a3=0 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1beca960 a2=50 a3=1 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.812000 audit: BPF prog-id=88 op=LOAD Aug 13 00:56:33.812000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1beca960 a2=94 a3=5 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.842000 audit: BPF prog-id=88 op=UNLOAD Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1becaa10 a2=50 a3=1 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.842000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe1becab30 a2=4 a3=38 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.842000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { confidentiality } for pid=2749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:33.842000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1becab80 a2=94 a3=6 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.842000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { confidentiality } for pid=2749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:33.842000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1beca330 a2=94 a3=88 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.842000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.842000 audit[2749]: AVC avc: denied { confidentiality } for pid=2749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:33.842000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1beca330 a2=94 a3=88 items=0 ppid=2645 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.842000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit: BPF prog-id=89 op=LOAD Aug 13 00:56:33.853000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec5c46c80 a2=98 a3=1999999999999999 items=0 ppid=2645 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:56:33.853000 audit: BPF prog-id=89 op=UNLOAD Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit: BPF prog-id=90 op=LOAD Aug 13 00:56:33.853000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec5c46b60 a2=94 a3=ffff items=0 ppid=2645 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:56:33.853000 audit: BPF prog-id=90 op=UNLOAD Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.853000 audit: BPF prog-id=91 op=LOAD Aug 13 00:56:33.853000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec5c46ba0 a2=94 a3=7ffec5c46d80 items=0 ppid=2645 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:56:33.853000 audit: BPF prog-id=91 op=UNLOAD Aug 13 00:56:33.927929 (udev-worker)[2583]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:56:33.933611 systemd-networkd[1360]: vxlan.calico: Link UP Aug 13 00:56:33.933630 systemd-networkd[1360]: vxlan.calico: Gained carrier Aug 13 00:56:33.963310 (udev-worker)[2786]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit: BPF prog-id=92 op=LOAD Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc074aa7f0 a2=98 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit: BPF prog-id=92 op=UNLOAD Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit: BPF prog-id=93 op=LOAD Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc074aa600 a2=94 a3=54428f items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit: BPF prog-id=93 op=UNLOAD Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit: BPF prog-id=94 op=LOAD Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc074aa630 a2=94 a3=2 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit: BPF prog-id=94 op=UNLOAD Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc074aa500 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc074aa530 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc074aa440 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc074aa550 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc074aa530 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc074aa520 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc074aa550 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc074aa530 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc074aa550 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc074aa520 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc074aa590 a2=28 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.964000 audit: BPF prog-id=95 op=LOAD Aug 13 00:56:33.964000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc074aa400 a2=94 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.964000 audit: BPF prog-id=95 op=UNLOAD Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc074aa3f0 a2=50 a3=2800 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc074aa3f0 a2=50 a3=2800 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit: BPF prog-id=96 op=LOAD Aug 13 00:56:33.965000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc074a9c10 a2=94 a3=2 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.965000 audit: BPF prog-id=96 op=UNLOAD Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.965000 audit: BPF prog-id=97 op=LOAD Aug 13 00:56:33.965000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc074a9d10 a2=94 a3=30 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit: BPF prog-id=98 op=LOAD Aug 13 00:56:33.970000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd30913510 a2=98 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.970000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:33.970000 audit: BPF prog-id=98 op=UNLOAD Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit: BPF prog-id=99 op=LOAD Aug 13 00:56:33.970000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd30913300 a2=94 a3=54428f items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.970000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:33.970000 audit: BPF prog-id=99 op=UNLOAD Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:33.970000 audit: BPF prog-id=100 op=LOAD Aug 13 00:56:33.970000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd30913330 a2=94 a3=2 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:33.970000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:33.970000 audit: BPF prog-id=100 op=UNLOAD Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit: BPF prog-id=101 op=LOAD Aug 13 00:56:34.084000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd309131f0 a2=94 a3=1 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.084000 audit: BPF prog-id=101 op=UNLOAD Aug 13 00:56:34.084000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.084000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd309132c0 a2=50 a3=7ffd309133a0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.094000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.094000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd30913200 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.094000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.094000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.094000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd30913230 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.094000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.094000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.094000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd30913140 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.094000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd30913250 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd30913230 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd30913220 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd30913250 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd30913230 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd30913250 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd30913220 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd30913290 a2=28 a3=0 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd30913040 a2=50 a3=1 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit: BPF prog-id=102 op=LOAD Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd30913040 a2=94 a3=5 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit: BPF prog-id=102 op=UNLOAD Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd309130f0 a2=50 a3=1 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd30913210 a2=4 a3=38 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { confidentiality } for pid=2800 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd30913260 a2=94 a3=6 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { confidentiality } for pid=2800 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd30912a10 a2=94 a3=88 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.095000 audit[2800]: AVC avc: denied { confidentiality } for pid=2800 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:34.095000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd30912a10 a2=94 a3=88 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.096000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.096000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd30914440 a2=10 a3=f8f00800 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.096000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.096000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd309142e0 a2=10 a3=3 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.096000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.096000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd30914280 a2=10 a3=3 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.096000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.096000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd30914280 a2=10 a3=7 items=0 ppid=2645 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:34.100000 audit: BPF prog-id=97 op=UNLOAD Aug 13 00:56:34.162000 audit[2825]: NETFILTER_CFG table=mangle:79 family=2 entries=16 op=nft_register_chain pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:34.162000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe20f9ef20 a2=0 a3=7ffe20f9ef0c items=0 ppid=2645 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.162000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:34.169000 audit[2823]: NETFILTER_CFG table=nat:80 family=2 entries=15 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:34.169000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd29a8a950 a2=0 a3=7ffd29a8a93c items=0 ppid=2645 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.169000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:34.172000 audit[2824]: NETFILTER_CFG table=filter:81 family=2 entries=39 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:34.172000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe75c02f40 a2=0 a3=7ffe75c02f2c items=0 ppid=2645 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.172000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:34.177000 audit[2822]: NETFILTER_CFG table=raw:82 family=2 entries=21 op=nft_register_chain pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:34.177000 audit[2822]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd44cafa60 a2=0 a3=7ffd44cafa4c items=0 ppid=2645 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.177000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:34.220310 kubelet[2014]: E0813 00:56:34.220178 2014 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:34.243836 kubelet[2014]: E0813 00:56:34.243785 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:34.834000 audit[2837]: NETFILTER_CFG table=filter:83 family=2 entries=9 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:34.834000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd017c1960 a2=0 a3=7ffd017c194c items=0 ppid=2229 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.834000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:34.838000 audit[2837]: NETFILTER_CFG table=nat:84 family=2 entries=31 op=nft_register_chain pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:34.838000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffd017c1960 a2=0 a3=7ffd017c194c items=0 ppid=2229 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:35.244607 kubelet[2014]: E0813 00:56:35.244483 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:35.372417 systemd-networkd[1360]: vxlan.calico: Gained IPv6LL Aug 13 00:56:36.245714 kubelet[2014]: E0813 00:56:36.245642 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:37.246041 kubelet[2014]: E0813 00:56:37.246001 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:37.840502 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Aug 13 00:56:37.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:37.856000 audit: BPF prog-id=54 op=UNLOAD Aug 13 00:56:37.856000 audit: BPF prog-id=53 op=UNLOAD Aug 13 00:56:37.856000 audit: BPF prog-id=52 op=UNLOAD Aug 13 00:56:38.246380 kubelet[2014]: E0813 00:56:38.246257 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:39.247338 kubelet[2014]: E0813 00:56:39.247256 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:39.727223 kernel: kauditd_printk_skb: 445 callbacks suppressed Aug 13 00:56:39.727362 kernel: audit: type=1325 audit(1755046599.724:686): table=filter:85 family=2 entries=8 op=nft_register_rule pid=2851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:39.724000 audit[2851]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=2851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:39.724000 audit[2851]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc9cddc50 a2=0 a3=7fffc9cddc3c items=0 ppid=2229 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.734308 kernel: audit: type=1300 audit(1755046599.724:686): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc9cddc50 a2=0 a3=7fffc9cddc3c items=0 ppid=2229 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.734460 kernel: audit: type=1327 audit(1755046599.724:686): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:39.724000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:39.733000 audit[2851]: NETFILTER_CFG table=nat:86 family=2 entries=34 op=nft_register_rule pid=2851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:39.739048 kernel: audit: type=1325 audit(1755046599.733:687): table=nat:86 family=2 entries=34 op=nft_register_rule pid=2851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:39.739118 kernel: audit: type=1300 audit(1755046599.733:687): arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fffc9cddc50 a2=0 a3=7fffc9cddc3c items=0 ppid=2229 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.733000 audit[2851]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fffc9cddc50 a2=0 a3=7fffc9cddc3c items=0 ppid=2229 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.743948 kernel: audit: type=1327 audit(1755046599.733:687): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:39.733000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:40.248120 kubelet[2014]: E0813 00:56:40.248079 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:40.468690 env[1633]: time="2025-08-13T00:56:40.467562676Z" level=info msg="StopPodSandbox for \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\"" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.576 [INFO][2861] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.578 [INFO][2861] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" iface="eth0" netns="/var/run/netns/cni-80ec118e-b26e-ed53-3799-1ef0f293dbcf" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.578 [INFO][2861] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" iface="eth0" netns="/var/run/netns/cni-80ec118e-b26e-ed53-3799-1ef0f293dbcf" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.579 [INFO][2861] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" iface="eth0" netns="/var/run/netns/cni-80ec118e-b26e-ed53-3799-1ef0f293dbcf" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.579 [INFO][2861] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.579 [INFO][2861] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.751 [INFO][2868] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.751 [INFO][2868] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.751 [INFO][2868] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.761 [WARNING][2868] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.761 [INFO][2868] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.763 [INFO][2868] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:40.766533 env[1633]: 2025-08-13 00:56:40.765 [INFO][2861] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:56:40.769701 env[1633]: time="2025-08-13T00:56:40.768528916Z" level=info msg="TearDown network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\" successfully" Aug 13 00:56:40.769701 env[1633]: time="2025-08-13T00:56:40.768563496Z" level=info msg="StopPodSandbox for \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\" returns successfully" Aug 13 00:56:40.768500 systemd[1]: run-netns-cni\x2d80ec118e\x2db26e\x2ded53\x2d3799\x2d1ef0f293dbcf.mount: Deactivated successfully. Aug 13 00:56:40.769967 env[1633]: time="2025-08-13T00:56:40.769798505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sp9ph,Uid:3d27de55-73cd-4e90-ae6f-fad3342847f4,Namespace:calico-system,Attempt:1,}" Aug 13 00:56:40.969244 systemd-networkd[1360]: cali54cbb6ac1d4: Link UP Aug 13 00:56:40.971211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:56:40.971288 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali54cbb6ac1d4: link becomes ready Aug 13 00:56:40.972728 systemd-networkd[1360]: cali54cbb6ac1d4: Gained carrier Aug 13 00:56:40.972741 (udev-worker)[2895]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.832 [INFO][2875] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.30-k8s-csi--node--driver--sp9ph-eth0 csi-node-driver- calico-system 3d27de55-73cd-4e90-ae6f-fad3342847f4 1218 0 2025-08-13 00:56:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.31.30 csi-node-driver-sp9ph eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali54cbb6ac1d4 [] [] }} ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.833 [INFO][2875] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.864 [INFO][2888] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" HandleID="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.865 [INFO][2888] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" HandleID="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d50a0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.31.30", "pod":"csi-node-driver-sp9ph", "timestamp":"2025-08-13 00:56:40.86444196 +0000 UTC"}, Hostname:"172.31.31.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.865 [INFO][2888] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.865 [INFO][2888] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.865 [INFO][2888] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.30' Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.879 [INFO][2888] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.911 [INFO][2888] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.922 [INFO][2888] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.929 [INFO][2888] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.935 [INFO][2888] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.935 [INFO][2888] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.938 [INFO][2888] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6 Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.947 [INFO][2888] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.962 [INFO][2888] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.129/26] block=192.168.36.128/26 handle="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.962 [INFO][2888] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.129/26] handle="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" host="172.31.31.30" Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.962 [INFO][2888] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:40.997607 env[1633]: 2025-08-13 00:56:40.962 [INFO][2888] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.129/26] IPv6=[] ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" HandleID="k8s-pod-network.afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.998934 env[1633]: 2025-08-13 00:56:40.964 [INFO][2875] cni-plugin/k8s.go 418: Populated endpoint ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-csi--node--driver--sp9ph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d27de55-73cd-4e90-ae6f-fad3342847f4", ResourceVersion:"1218", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"", Pod:"csi-node-driver-sp9ph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali54cbb6ac1d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:40.998934 env[1633]: 2025-08-13 00:56:40.964 [INFO][2875] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.129/32] ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.998934 env[1633]: 2025-08-13 00:56:40.964 [INFO][2875] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali54cbb6ac1d4 ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.998934 env[1633]: 2025-08-13 00:56:40.976 [INFO][2875] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:40.998934 env[1633]: 2025-08-13 00:56:40.976 [INFO][2875] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-csi--node--driver--sp9ph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d27de55-73cd-4e90-ae6f-fad3342847f4", ResourceVersion:"1218", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6", Pod:"csi-node-driver-sp9ph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali54cbb6ac1d4", MAC:"4a:57:34:5f:40:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:40.998934 env[1633]: 2025-08-13 00:56:40.996 [INFO][2875] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6" Namespace="calico-system" Pod="csi-node-driver-sp9ph" WorkloadEndpoint="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:56:41.014331 env[1633]: time="2025-08-13T00:56:41.014247081Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:41.014331 env[1633]: time="2025-08-13T00:56:41.014290459Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:41.014649 env[1633]: time="2025-08-13T00:56:41.014321022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:41.014649 env[1633]: time="2025-08-13T00:56:41.014577463Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6 pid=2912 runtime=io.containerd.runc.v2 Aug 13 00:56:41.044399 systemd[1]: Started cri-containerd-afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6.scope. Aug 13 00:56:41.068524 kernel: audit: type=1400 audit(1755046601.060:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.068621 kernel: audit: type=1400 audit(1755046601.060:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.072503 kernel: audit: type=1400 audit(1755046601.060:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.079381 kernel: audit: type=1400 audit(1755046601.060:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit: BPF prog-id=103 op=LOAD Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166656263646636346165366163663165313439616532663762323562 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166656263646636346165366163663165313439616532663762323562 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.032000 audit[2924]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:41.032000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe5d1bc190 a2=0 a3=7ffe5d1bc17c items=0 ppid=2645 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.032000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:41.067000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.067000 audit: BPF prog-id=104 op=LOAD Aug 13 00:56:41.067000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003484c0 items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166656263646636346165366163663165313439616532663762323562 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit: BPF prog-id=105 op=LOAD Aug 13 00:56:41.078000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000348508 items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166656263646636346165366163663165313439616532663762323562 Aug 13 00:56:41.078000 audit: BPF prog-id=105 op=UNLOAD Aug 13 00:56:41.078000 audit: BPF prog-id=104 op=UNLOAD Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.078000 audit: BPF prog-id=106 op=LOAD Aug 13 00:56:41.078000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000348918 items=0 ppid=2912 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166656263646636346165366163663165313439616532663762323562 Aug 13 00:56:41.096784 env[1633]: time="2025-08-13T00:56:41.096731154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sp9ph,Uid:3d27de55-73cd-4e90-ae6f-fad3342847f4,Namespace:calico-system,Attempt:1,} returns sandbox id \"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6\"" Aug 13 00:56:41.098849 env[1633]: time="2025-08-13T00:56:41.098787642Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Aug 13 00:56:41.249242 kubelet[2014]: E0813 00:56:41.249178 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:41.310000 audit[2953]: NETFILTER_CFG table=filter:88 family=2 entries=8 op=nft_register_rule pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:41.310000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe4f1efbc0 a2=0 a3=7ffe4f1efbac items=0 ppid=2229 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:41.315000 audit[2953]: NETFILTER_CFG table=nat:89 family=2 entries=38 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:41.315000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7ffe4f1efbc0 a2=0 a3=7ffe4f1efbac items=0 ppid=2229 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:41.768558 systemd[1]: run-containerd-runc-k8s.io-afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6-runc.5eUA7y.mount: Deactivated successfully. Aug 13 00:56:42.249683 kubelet[2014]: E0813 00:56:42.249641 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:42.288497 env[1633]: time="2025-08-13T00:56:42.288446393Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:42.290492 env[1633]: time="2025-08-13T00:56:42.290455856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:42.292273 env[1633]: time="2025-08-13T00:56:42.292248303Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:42.293574 env[1633]: time="2025-08-13T00:56:42.293554108Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:42.293955 env[1633]: time="2025-08-13T00:56:42.293927058Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Aug 13 00:56:42.296062 env[1633]: time="2025-08-13T00:56:42.296024683Z" level=info msg="CreateContainer within sandbox \"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Aug 13 00:56:42.307886 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2938824029.mount: Deactivated successfully. Aug 13 00:56:42.312437 env[1633]: time="2025-08-13T00:56:42.312383867Z" level=info msg="CreateContainer within sandbox \"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0f96136513269a05d62f0fe2f2bda49e1ac735d2f755b7d69f6099948d20648a\"" Aug 13 00:56:42.313106 env[1633]: time="2025-08-13T00:56:42.313076396Z" level=info msg="StartContainer for \"0f96136513269a05d62f0fe2f2bda49e1ac735d2f755b7d69f6099948d20648a\"" Aug 13 00:56:42.339715 systemd[1]: Started cri-containerd-0f96136513269a05d62f0fe2f2bda49e1ac735d2f755b7d69f6099948d20648a.scope. Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f64059172f8 items=0 ppid=2912 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393631333635313332363961303564363266306665326632626461 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit: BPF prog-id=107 op=LOAD Aug 13 00:56:42.358000 audit[2961]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000247f8 items=0 ppid=2912 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393631333635313332363961303564363266306665326632626461 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.358000 audit: BPF prog-id=108 op=LOAD Aug 13 00:56:42.358000 audit[2961]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024848 items=0 ppid=2912 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393631333635313332363961303564363266306665326632626461 Aug 13 00:56:42.359000 audit: BPF prog-id=108 op=UNLOAD Aug 13 00:56:42.359000 audit: BPF prog-id=107 op=UNLOAD Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { perfmon } for pid=2961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit[2961]: AVC avc: denied { bpf } for pid=2961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.359000 audit: BPF prog-id=109 op=LOAD Aug 13 00:56:42.359000 audit[2961]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000248d8 items=0 ppid=2912 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393631333635313332363961303564363266306665326632626461 Aug 13 00:56:42.376778 env[1633]: time="2025-08-13T00:56:42.376733665Z" level=info msg="StartContainer for \"0f96136513269a05d62f0fe2f2bda49e1ac735d2f755b7d69f6099948d20648a\" returns successfully" Aug 13 00:56:42.378022 env[1633]: time="2025-08-13T00:56:42.377997157Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Aug 13 00:56:42.467765 env[1633]: time="2025-08-13T00:56:42.467255366Z" level=info msg="StopPodSandbox for \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\"" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.515 [INFO][2995] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.515 [INFO][2995] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" iface="eth0" netns="/var/run/netns/cni-fc33a4dc-0356-567a-40e6-5c3e85f0a1f5" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.515 [INFO][2995] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" iface="eth0" netns="/var/run/netns/cni-fc33a4dc-0356-567a-40e6-5c3e85f0a1f5" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.516 [INFO][2995] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" iface="eth0" netns="/var/run/netns/cni-fc33a4dc-0356-567a-40e6-5c3e85f0a1f5" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.516 [INFO][2995] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.516 [INFO][2995] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.542 [INFO][3002] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.542 [INFO][3002] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.542 [INFO][3002] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.563 [WARNING][3002] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.563 [INFO][3002] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.566 [INFO][3002] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:42.569887 env[1633]: 2025-08-13 00:56:42.567 [INFO][2995] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:56:42.569887 env[1633]: time="2025-08-13T00:56:42.568865340Z" level=info msg="TearDown network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\" successfully" Aug 13 00:56:42.569887 env[1633]: time="2025-08-13T00:56:42.568893091Z" level=info msg="StopPodSandbox for \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\" returns successfully" Aug 13 00:56:42.570632 env[1633]: time="2025-08-13T00:56:42.570588822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t42ts,Uid:72a4d4d7-e528-4079-870c-844a5f57dae1,Namespace:default,Attempt:1,}" Aug 13 00:56:42.708267 systemd-networkd[1360]: calib2af6047004: Link UP Aug 13 00:56:42.711751 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:56:42.712167 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib2af6047004: link becomes ready Aug 13 00:56:42.712242 systemd-networkd[1360]: calib2af6047004: Gained carrier Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.618 [INFO][3008] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0 nginx-deployment-7fcdb87857- default 72a4d4d7-e528-4079-870c-844a5f57dae1 1244 0 2025-08-13 00:56:30 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.30 nginx-deployment-7fcdb87857-t42ts eth0 default [] [] [kns.default ksa.default.default] calib2af6047004 [] [] }} ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.618 [INFO][3008] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.649 [INFO][3022] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" HandleID="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.649 [INFO][3022] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" HandleID="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd040), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.30", "pod":"nginx-deployment-7fcdb87857-t42ts", "timestamp":"2025-08-13 00:56:42.649124489 +0000 UTC"}, Hostname:"172.31.31.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.649 [INFO][3022] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.649 [INFO][3022] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.649 [INFO][3022] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.30' Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.662 [INFO][3022] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.669 [INFO][3022] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.677 [INFO][3022] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.680 [INFO][3022] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.684 [INFO][3022] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.684 [INFO][3022] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.687 [INFO][3022] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06 Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.692 [INFO][3022] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.703 [INFO][3022] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.130/26] block=192.168.36.128/26 handle="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.703 [INFO][3022] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.130/26] handle="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" host="172.31.31.30" Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.703 [INFO][3022] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:42.731360 env[1633]: 2025-08-13 00:56:42.703 [INFO][3022] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.130/26] IPv6=[] ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" HandleID="k8s-pod-network.a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.734290 env[1633]: 2025-08-13 00:56:42.705 [INFO][3008] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"72a4d4d7-e528-4079-870c-844a5f57dae1", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-t42ts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib2af6047004", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:42.734290 env[1633]: 2025-08-13 00:56:42.705 [INFO][3008] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.130/32] ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.734290 env[1633]: 2025-08-13 00:56:42.705 [INFO][3008] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib2af6047004 ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.734290 env[1633]: 2025-08-13 00:56:42.712 [INFO][3008] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.734290 env[1633]: 2025-08-13 00:56:42.718 [INFO][3008] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"72a4d4d7-e528-4079-870c-844a5f57dae1", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06", Pod:"nginx-deployment-7fcdb87857-t42ts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib2af6047004", MAC:"96:5b:f6:15:34:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:42.734290 env[1633]: 2025-08-13 00:56:42.730 [INFO][3008] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06" Namespace="default" Pod="nginx-deployment-7fcdb87857-t42ts" WorkloadEndpoint="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:56:42.732337 systemd-networkd[1360]: cali54cbb6ac1d4: Gained IPv6LL Aug 13 00:56:42.749000 audit[3036]: NETFILTER_CFG table=filter:90 family=2 entries=42 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:42.749000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffd0d43c7a0 a2=0 a3=7ffd0d43c78c items=0 ppid=2645 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.749000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:42.763250 env[1633]: time="2025-08-13T00:56:42.763147027Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:42.763250 env[1633]: time="2025-08-13T00:56:42.763212209Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:42.763250 env[1633]: time="2025-08-13T00:56:42.763229732Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:42.763816 env[1633]: time="2025-08-13T00:56:42.763746198Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06 pid=3045 runtime=io.containerd.runc.v2 Aug 13 00:56:42.777546 systemd[1]: run-containerd-runc-k8s.io-0f96136513269a05d62f0fe2f2bda49e1ac735d2f755b7d69f6099948d20648a-runc.e4SPkU.mount: Deactivated successfully. Aug 13 00:56:42.777671 systemd[1]: run-netns-cni\x2dfc33a4dc\x2d0356\x2d567a\x2d40e6\x2d5c3e85f0a1f5.mount: Deactivated successfully. Aug 13 00:56:42.792513 systemd[1]: Started cri-containerd-a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06.scope. Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit: BPF prog-id=110 op=LOAD Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3045 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386361343332643763346139633130333832366465343435636639 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3045 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386361343332643763346139633130333832366465343435636639 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.804000 audit: BPF prog-id=111 op=LOAD Aug 13 00:56:42.804000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c81d0 items=0 ppid=3045 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386361343332643763346139633130333832366465343435636639 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit: BPF prog-id=112 op=LOAD Aug 13 00:56:42.806000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c8218 items=0 ppid=3045 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386361343332643763346139633130333832366465343435636639 Aug 13 00:56:42.806000 audit: BPF prog-id=112 op=UNLOAD Aug 13 00:56:42.806000 audit: BPF prog-id=111 op=UNLOAD Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:42.806000 audit: BPF prog-id=113 op=LOAD Aug 13 00:56:42.806000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8628 items=0 ppid=3045 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:42.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386361343332643763346139633130333832366465343435636639 Aug 13 00:56:42.844896 env[1633]: time="2025-08-13T00:56:42.841661780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t42ts,Uid:72a4d4d7-e528-4079-870c-844a5f57dae1,Namespace:default,Attempt:1,} returns sandbox id \"a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06\"" Aug 13 00:56:43.250269 kubelet[2014]: E0813 00:56:43.250219 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:43.703790 amazon-ssm-agent[1703]: 2025-08-13 00:56:43 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Aug 13 00:56:43.811260 env[1633]: time="2025-08-13T00:56:43.811207095Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:43.813270 env[1633]: time="2025-08-13T00:56:43.813236531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:43.815055 env[1633]: time="2025-08-13T00:56:43.815029786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:43.816991 env[1633]: time="2025-08-13T00:56:43.816951163Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:43.817681 env[1633]: time="2025-08-13T00:56:43.817587939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Aug 13 00:56:43.819581 env[1633]: time="2025-08-13T00:56:43.819554076Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Aug 13 00:56:43.820531 env[1633]: time="2025-08-13T00:56:43.820500455Z" level=info msg="CreateContainer within sandbox \"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Aug 13 00:56:43.847460 env[1633]: time="2025-08-13T00:56:43.847408949Z" level=info msg="CreateContainer within sandbox \"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"83b89f4b12cceb9fe8a891fea750181c6a68d74e55330807d3399d645adf600b\"" Aug 13 00:56:43.848296 env[1633]: time="2025-08-13T00:56:43.848258250Z" level=info msg="StartContainer for \"83b89f4b12cceb9fe8a891fea750181c6a68d74e55330807d3399d645adf600b\"" Aug 13 00:56:43.881791 systemd[1]: Started cri-containerd-83b89f4b12cceb9fe8a891fea750181c6a68d74e55330807d3399d645adf600b.scope. Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8cff457968 items=0 ppid=2912 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:43.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623839663462313263636562396665386138393166656137353031 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.895000 audit: BPF prog-id=114 op=LOAD Aug 13 00:56:43.895000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000390768 items=0 ppid=2912 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:43.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623839663462313263636562396665386138393166656137353031 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit: BPF prog-id=115 op=LOAD Aug 13 00:56:43.896000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003907b8 items=0 ppid=2912 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:43.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623839663462313263636562396665386138393166656137353031 Aug 13 00:56:43.896000 audit: BPF prog-id=115 op=UNLOAD Aug 13 00:56:43.896000 audit: BPF prog-id=114 op=UNLOAD Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:43.896000 audit: BPF prog-id=116 op=LOAD Aug 13 00:56:43.896000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000390848 items=0 ppid=2912 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:43.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623839663462313263636562396665386138393166656137353031 Aug 13 00:56:43.920372 env[1633]: time="2025-08-13T00:56:43.920314459Z" level=info msg="StartContainer for \"83b89f4b12cceb9fe8a891fea750181c6a68d74e55330807d3399d645adf600b\" returns successfully" Aug 13 00:56:44.250924 kubelet[2014]: E0813 00:56:44.250872 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:44.332422 systemd-networkd[1360]: calib2af6047004: Gained IPv6LL Aug 13 00:56:44.360240 kubelet[2014]: I0813 00:56:44.360212 2014 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Aug 13 00:56:44.360240 kubelet[2014]: I0813 00:56:44.360241 2014 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Aug 13 00:56:45.251296 kubelet[2014]: E0813 00:56:45.251179 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:46.252285 kubelet[2014]: E0813 00:56:46.252219 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:46.344008 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount427041996.mount: Deactivated successfully. Aug 13 00:56:47.253318 kubelet[2014]: E0813 00:56:47.253246 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:47.970170 env[1633]: time="2025-08-13T00:56:47.970117865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:47.974186 env[1633]: time="2025-08-13T00:56:47.974142357Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:47.977667 env[1633]: time="2025-08-13T00:56:47.977627678Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:47.981828 env[1633]: time="2025-08-13T00:56:47.981788045Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:a6969d434cb816d30787e9f7ab16b632e12dc05a2c8f4dae701d83ef2199c985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:47.982649 env[1633]: time="2025-08-13T00:56:47.982616817Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305\"" Aug 13 00:56:47.985135 env[1633]: time="2025-08-13T00:56:47.985103631Z" level=info msg="CreateContainer within sandbox \"a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Aug 13 00:56:48.009596 env[1633]: time="2025-08-13T00:56:48.009543320Z" level=info msg="CreateContainer within sandbox \"a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3c8c35e0663136813a32bf326f931befea0d515af8d6a528bac60277da1b0617\"" Aug 13 00:56:48.010477 env[1633]: time="2025-08-13T00:56:48.010419732Z" level=info msg="StartContainer for \"3c8c35e0663136813a32bf326f931befea0d515af8d6a528bac60277da1b0617\"" Aug 13 00:56:48.034335 systemd[1]: Started cri-containerd-3c8c35e0663136813a32bf326f931befea0d515af8d6a528bac60277da1b0617.scope. Aug 13 00:56:48.067154 kernel: kauditd_printk_skb: 208 callbacks suppressed Aug 13 00:56:48.067492 kernel: audit: type=1400 audit(1755046608.057:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.067544 kernel: audit: type=1400 audit(1755046608.057:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.074723 kernel: audit: type=1400 audit(1755046608.057:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.074780 kernel: audit: type=1400 audit(1755046608.057:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.078500 kernel: audit: type=1400 audit(1755046608.057:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.078611 kernel: audit: type=1400 audit(1755046608.057:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.085466 kernel: audit: type=1400 audit(1755046608.057:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.089386 kernel: audit: type=1400 audit(1755046608.057:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.094631 kernel: audit: type=1400 audit(1755046608.057:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.094735 kernel: audit: type=1400 audit(1755046608.062:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit: BPF prog-id=117 op=LOAD Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3045 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386333356530363633313336383133613332626633323666393331 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3045 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386333356530363633313336383133613332626633323666393331 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.062000 audit: BPF prog-id=118 op=LOAD Aug 13 00:56:48.062000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001b4390 items=0 ppid=3045 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386333356530363633313336383133613332626633323666393331 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit: BPF prog-id=119 op=LOAD Aug 13 00:56:48.066000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001b43d8 items=0 ppid=3045 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386333356530363633313336383133613332626633323666393331 Aug 13 00:56:48.066000 audit: BPF prog-id=119 op=UNLOAD Aug 13 00:56:48.066000 audit: BPF prog-id=118 op=UNLOAD Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.066000 audit: BPF prog-id=120 op=LOAD Aug 13 00:56:48.066000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001b47e8 items=0 ppid=3045 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386333356530363633313336383133613332626633323666393331 Aug 13 00:56:48.115211 env[1633]: time="2025-08-13T00:56:48.115146585Z" level=info msg="StartContainer for \"3c8c35e0663136813a32bf326f931befea0d515af8d6a528bac60277da1b0617\" returns successfully" Aug 13 00:56:48.254053 kubelet[2014]: E0813 00:56:48.253929 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:48.561513 kubelet[2014]: I0813 00:56:48.561401 2014 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-sp9ph" podStartSLOduration=31.840693304 podStartE2EDuration="34.561383687s" podCreationTimestamp="2025-08-13 00:56:14 +0000 UTC" firstStartedPulling="2025-08-13 00:56:41.098359223 +0000 UTC m=+27.316113319" lastFinishedPulling="2025-08-13 00:56:43.819049559 +0000 UTC m=+30.036803702" observedRunningTime="2025-08-13 00:56:44.560140635 +0000 UTC m=+30.777894755" watchObservedRunningTime="2025-08-13 00:56:48.561383687 +0000 UTC m=+34.779137804" Aug 13 00:56:49.255842 kubelet[2014]: E0813 00:56:49.255790 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:50.256672 kubelet[2014]: E0813 00:56:50.256627 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:51.257626 kubelet[2014]: E0813 00:56:51.257548 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:52.258340 kubelet[2014]: E0813 00:56:52.258279 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:52.983000 audit[3184]: NETFILTER_CFG table=filter:91 family=2 entries=20 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:52.983000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe76e7c0c0 a2=0 a3=7ffe76e7c0ac items=0 ppid=2229 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:52.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:52.988000 audit[3184]: NETFILTER_CFG table=nat:92 family=2 entries=26 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:52.988000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe76e7c0c0 a2=0 a3=0 items=0 ppid=2229 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:52.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:53.039000 audit[3186]: NETFILTER_CFG table=filter:93 family=2 entries=32 op=nft_register_rule pid=3186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:53.039000 audit[3186]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdbab2fbe0 a2=0 a3=7ffdbab2fbcc items=0 ppid=2229 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:53.043000 audit[3186]: NETFILTER_CFG table=nat:94 family=2 entries=26 op=nft_register_rule pid=3186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:53.043000 audit[3186]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffdbab2fbe0 a2=0 a3=0 items=0 ppid=2229 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:53.157720 update_engine[1623]: I0813 00:56:53.157647 1623 update_attempter.cc:509] Updating boot flags... Aug 13 00:56:53.260636 kubelet[2014]: E0813 00:56:53.260229 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:53.332327 kubelet[2014]: I0813 00:56:53.332279 2014 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-t42ts" podStartSLOduration=18.19280098 podStartE2EDuration="23.332262791s" podCreationTimestamp="2025-08-13 00:56:30 +0000 UTC" firstStartedPulling="2025-08-13 00:56:42.844329581 +0000 UTC m=+29.062083684" lastFinishedPulling="2025-08-13 00:56:47.983791398 +0000 UTC m=+34.201545495" observedRunningTime="2025-08-13 00:56:48.561663546 +0000 UTC m=+34.779417644" watchObservedRunningTime="2025-08-13 00:56:53.332262791 +0000 UTC m=+39.550016907" Aug 13 00:56:53.337981 systemd[1]: Created slice kubepods-besteffort-pod51fe3038_0cb0_484d_bb0a_f1b88cb6d9aa.slice. Aug 13 00:56:53.430794 kubelet[2014]: I0813 00:56:53.430743 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2xj5c\" (UniqueName: \"kubernetes.io/projected/51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa-kube-api-access-2xj5c\") pod \"nfs-server-provisioner-0\" (UID: \"51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa\") " pod="default/nfs-server-provisioner-0" Aug 13 00:56:53.430974 kubelet[2014]: I0813 00:56:53.430820 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa-data\") pod \"nfs-server-provisioner-0\" (UID: \"51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa\") " pod="default/nfs-server-provisioner-0" Aug 13 00:56:53.641730 env[1633]: time="2025-08-13T00:56:53.641423929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa,Namespace:default,Attempt:0,}" Aug 13 00:56:53.862048 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:56:53.862174 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Aug 13 00:56:53.859454 systemd-networkd[1360]: cali60e51b789ff: Link UP Aug 13 00:56:53.859667 (udev-worker)[3204]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:56:53.863275 systemd-networkd[1360]: cali60e51b789ff: Gained carrier Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.728 [INFO][3370] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.30-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa 1310 0 2025-08-13 00:56:53 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.31.30 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.729 [INFO][3370] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.767 [INFO][3384] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" HandleID="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Workload="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.767 [INFO][3384] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" HandleID="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Workload="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.30", "pod":"nfs-server-provisioner-0", "timestamp":"2025-08-13 00:56:53.767290125 +0000 UTC"}, Hostname:"172.31.31.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.768 [INFO][3384] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.768 [INFO][3384] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.768 [INFO][3384] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.30' Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.788 [INFO][3384] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.803 [INFO][3384] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.812 [INFO][3384] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.817 [INFO][3384] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.827 [INFO][3384] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.827 [INFO][3384] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.830 [INFO][3384] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076 Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.837 [INFO][3384] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.852 [INFO][3384] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.131/26] block=192.168.36.128/26 handle="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.852 [INFO][3384] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.131/26] handle="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" host="172.31.31.30" Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.852 [INFO][3384] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:53.879124 env[1633]: 2025-08-13 00:56:53.852 [INFO][3384] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.131/26] IPv6=[] ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" HandleID="k8s-pod-network.534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Workload="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:53.879788 env[1633]: 2025-08-13 00:56:53.854 [INFO][3370] cni-plugin/k8s.go 418: Populated endpoint ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.36.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:53.879788 env[1633]: 2025-08-13 00:56:53.854 [INFO][3370] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.131/32] ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:53.879788 env[1633]: 2025-08-13 00:56:53.854 [INFO][3370] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:53.879788 env[1633]: 2025-08-13 00:56:53.864 [INFO][3370] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:53.880113 env[1633]: 2025-08-13 00:56:53.864 [INFO][3370] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.36.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"02:0b:59:12:40:96", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:53.880113 env[1633]: 2025-08-13 00:56:53.877 [INFO][3370] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.30-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:53.896039 env[1633]: time="2025-08-13T00:56:53.893105665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:53.896039 env[1633]: time="2025-08-13T00:56:53.893201648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:53.896039 env[1633]: time="2025-08-13T00:56:53.893245552Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:53.896039 env[1633]: time="2025-08-13T00:56:53.893403549Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076 pid=3403 runtime=io.containerd.runc.v2 Aug 13 00:56:53.923485 kernel: kauditd_printk_skb: 59 callbacks suppressed Aug 13 00:56:53.923636 kernel: audit: type=1325 audit(1755046613.910:762): table=filter:95 family=2 entries=40 op=nft_register_chain pid=3417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:53.910000 audit[3417]: NETFILTER_CFG table=filter:95 family=2 entries=40 op=nft_register_chain pid=3417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:53.910000 audit[3417]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffdc3cefa60 a2=0 a3=7ffdc3cefa4c items=0 ppid=2645 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:53.940877 systemd[1]: Started cri-containerd-534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076.scope. Aug 13 00:56:53.943133 kernel: audit: type=1300 audit(1755046613.910:762): arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffdc3cefa60 a2=0 a3=7ffdc3cefa4c items=0 ppid=2645 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.943232 kernel: audit: type=1327 audit(1755046613.910:762): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.978444 kernel: audit: type=1400 audit(1755046613.963:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.978574 kernel: audit: type=1400 audit(1755046613.963:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.985646 kernel: audit: type=1400 audit(1755046613.963:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.992422 kernel: audit: type=1400 audit(1755046613.963:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:54.001334 kernel: audit: type=1400 audit(1755046613.963:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:54.010232 kernel: audit: type=1400 audit(1755046613.963:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:54.018216 kernel: audit: type=1400 audit(1755046613.963:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit: BPF prog-id=121 op=LOAD Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3403 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346232643333663738643232663565663765343661323238363061 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3403 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346232643333663738643232663565663765343661323238363061 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.970000 audit: BPF prog-id=122 op=LOAD Aug 13 00:56:53.970000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3a20 items=0 ppid=3403 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346232643333663738643232663565663765343661323238363061 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit: BPF prog-id=123 op=LOAD Aug 13 00:56:53.977000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3a68 items=0 ppid=3403 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346232643333663738643232663565663765343661323238363061 Aug 13 00:56:53.977000 audit: BPF prog-id=123 op=UNLOAD Aug 13 00:56:53.977000 audit: BPF prog-id=122 op=UNLOAD Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:53.977000 audit: BPF prog-id=124 op=LOAD Aug 13 00:56:53.977000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e3e78 items=0 ppid=3403 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:53.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346232643333663738643232663565663765343661323238363061 Aug 13 00:56:54.034297 env[1633]: time="2025-08-13T00:56:54.034239284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51fe3038-0cb0-484d-bb0a-f1b88cb6d9aa,Namespace:default,Attempt:0,} returns sandbox id \"534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076\"" Aug 13 00:56:54.036719 env[1633]: time="2025-08-13T00:56:54.036684943Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Aug 13 00:56:54.221461 kubelet[2014]: E0813 00:56:54.221418 2014 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:54.261214 kubelet[2014]: E0813 00:56:54.261141 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:55.261915 kubelet[2014]: E0813 00:56:55.261858 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:55.286696 amazon-ssm-agent[1703]: 2025-08-13 00:56:55 INFO [HealthCheck] HealthCheck reporting agent health. Aug 13 00:56:55.661158 systemd-networkd[1360]: cali60e51b789ff: Gained IPv6LL Aug 13 00:56:56.262905 kubelet[2014]: E0813 00:56:56.262834 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:56.591399 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4076701068.mount: Deactivated successfully. Aug 13 00:56:57.263912 kubelet[2014]: E0813 00:56:57.263856 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:58.264246 kubelet[2014]: E0813 00:56:58.264203 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:58.738970 env[1633]: time="2025-08-13T00:56:58.738918604Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.743178 env[1633]: time="2025-08-13T00:56:58.743137717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.746242 env[1633]: time="2025-08-13T00:56:58.746202942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.749229 env[1633]: time="2025-08-13T00:56:58.749172668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.749860 env[1633]: time="2025-08-13T00:56:58.749822890Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Aug 13 00:56:58.851862 env[1633]: time="2025-08-13T00:56:58.851819657Z" level=info msg="CreateContainer within sandbox \"534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Aug 13 00:56:58.875084 env[1633]: time="2025-08-13T00:56:58.875030765Z" level=info msg="CreateContainer within sandbox \"534b2d33f78d22f5ef7e46a22860a7aeee2cdd9db974747bfda6f11fb706a076\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b02c24c56b24be8217ea598cedb113ac642273bd67cf86deb7888125af490736\"" Aug 13 00:56:58.876214 env[1633]: time="2025-08-13T00:56:58.875709017Z" level=info msg="StartContainer for \"b02c24c56b24be8217ea598cedb113ac642273bd67cf86deb7888125af490736\"" Aug 13 00:56:58.910013 systemd[1]: Started cri-containerd-b02c24c56b24be8217ea598cedb113ac642273bd67cf86deb7888125af490736.scope. Aug 13 00:56:58.934746 kernel: kauditd_printk_skb: 50 callbacks suppressed Aug 13 00:56:58.934896 kernel: audit: type=1400 audit(1755046618.925:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934941 kernel: audit: type=1400 audit(1755046618.925:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.941218 kernel: audit: type=1400 audit(1755046618.925:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.946447 kernel: audit: type=1400 audit(1755046618.925:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.955223 kernel: audit: type=1400 audit(1755046618.925:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.965222 kernel: audit: type=1400 audit(1755046618.925:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.971295 kernel: audit: type=1400 audit(1755046618.925:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.983162 kernel: audit: type=1400 audit(1755046618.925:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.985004 kernel: audit: type=1400 audit(1755046618.925:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.985061 kernel: audit: type=1400 audit(1755046618.933:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.933000 audit: BPF prog-id=125 op=LOAD Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3403 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326332346335366232346265383231376561353938636564623131 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3403 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326332346335366232346265383231376561353938636564623131 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.934000 audit: BPF prog-id=126 op=LOAD Aug 13 00:56:58.934000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c41e0 items=0 ppid=3403 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326332346335366232346265383231376561353938636564623131 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit: BPF prog-id=127 op=LOAD Aug 13 00:56:58.935000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c4228 items=0 ppid=3403 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326332346335366232346265383231376561353938636564623131 Aug 13 00:56:58.935000 audit: BPF prog-id=127 op=UNLOAD Aug 13 00:56:58.935000 audit: BPF prog-id=126 op=UNLOAD Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.935000 audit: BPF prog-id=128 op=LOAD Aug 13 00:56:58.935000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c4638 items=0 ppid=3403 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326332346335366232346265383231376561353938636564623131 Aug 13 00:56:59.003532 env[1633]: time="2025-08-13T00:56:59.003453153Z" level=info msg="StartContainer for \"b02c24c56b24be8217ea598cedb113ac642273bd67cf86deb7888125af490736\" returns successfully" Aug 13 00:56:59.038000 audit[3483]: AVC avc: denied { search } for pid=3483 comm="rpcbind" name="crypto" dev="proc" ino=23609 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:56:59.038000 audit[3483]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbb1d6ae0c0 a2=0 a3=0 items=0 ppid=3464 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 key=(null) Aug 13 00:56:59.038000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Aug 13 00:56:59.079000 audit[3488]: AVC avc: denied { search } for pid=3488 comm="dbus-daemon" name="crypto" dev="proc" ino=23609 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:56:59.079000 audit[3488]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2e5b3a50c0 a2=0 a3=0 items=0 ppid=3464 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 key=(null) Aug 13 00:56:59.079000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Aug 13 00:56:59.082000 audit[3489]: AVC avc: denied { watch } for pid=3489 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538084 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c800 tclass=dir permissive=0 Aug 13 00:56:59.082000 audit[3489]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5626530a7c10 a2=2c8 a3=7fff1b13b44c items=0 ppid=3464 pid=3489 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 key=(null) Aug 13 00:56:59.082000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Aug 13 00:56:59.088000 audit[3490]: AVC avc: denied { read } for pid=3490 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23680 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Aug 13 00:56:59.088000 audit[3490]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fa3ae1ae320 a1=80000 a2=d a3=7fffcba12380 items=0 ppid=3464 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 key=(null) Aug 13 00:56:59.088000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Aug 13 00:56:59.089000 audit[3490]: AVC avc: denied { search } for pid=3490 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23609 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:56:59.089000 audit[3490]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa3ad7020c0 a2=0 a3=0 items=0 ppid=3464 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c800 key=(null) Aug 13 00:56:59.089000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Aug 13 00:56:59.265455 kubelet[2014]: E0813 00:56:59.265362 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:59.612000 audit[3495]: NETFILTER_CFG table=filter:96 family=2 entries=20 op=nft_register_rule pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:59.612000 audit[3495]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff9e68e820 a2=0 a3=7fff9e68e80c items=0 ppid=2229 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:59.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:59.618000 audit[3495]: NETFILTER_CFG table=nat:97 family=2 entries=110 op=nft_register_chain pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:59.618000 audit[3495]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fff9e68e820 a2=0 a3=7fff9e68e80c items=0 ppid=2229 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:59.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:57:00.266621 kubelet[2014]: E0813 00:57:00.266545 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:01.267039 kubelet[2014]: E0813 00:57:01.266982 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:02.267591 kubelet[2014]: E0813 00:57:02.267533 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:03.268394 kubelet[2014]: E0813 00:57:03.268350 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:03.546969 systemd[1]: run-containerd-runc-k8s.io-61fcf59e693bb4d36edb9617f39f1e41a0c9c47802d40bf970ef769c92fce916-runc.uogKGV.mount: Deactivated successfully. Aug 13 00:57:03.693440 kubelet[2014]: I0813 00:57:03.693326 2014 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=5.958125707 podStartE2EDuration="10.693307393s" podCreationTimestamp="2025-08-13 00:56:53 +0000 UTC" firstStartedPulling="2025-08-13 00:56:54.036071681 +0000 UTC m=+40.253825778" lastFinishedPulling="2025-08-13 00:56:58.771253367 +0000 UTC m=+44.989007464" observedRunningTime="2025-08-13 00:56:59.593489764 +0000 UTC m=+45.811243875" watchObservedRunningTime="2025-08-13 00:57:03.693307393 +0000 UTC m=+49.911061527" Aug 13 00:57:04.268580 kubelet[2014]: E0813 00:57:04.268536 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:05.269320 kubelet[2014]: E0813 00:57:05.269265 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:06.269465 kubelet[2014]: E0813 00:57:06.269413 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:07.269947 kubelet[2014]: E0813 00:57:07.269902 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:08.270776 kubelet[2014]: E0813 00:57:08.270725 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:09.271508 kubelet[2014]: E0813 00:57:09.271454 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:10.272085 kubelet[2014]: E0813 00:57:10.272021 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:11.272460 kubelet[2014]: E0813 00:57:11.272414 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:12.273132 kubelet[2014]: E0813 00:57:12.273078 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:13.273910 kubelet[2014]: E0813 00:57:13.273858 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:14.220877 kubelet[2014]: E0813 00:57:14.220824 2014 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:14.261099 env[1633]: time="2025-08-13T00:57:14.261065919Z" level=info msg="StopPodSandbox for \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\"" Aug 13 00:57:14.274593 kubelet[2014]: E0813 00:57:14.274556 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.314 [WARNING][3553] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-csi--node--driver--sp9ph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d27de55-73cd-4e90-ae6f-fad3342847f4", ResourceVersion:"1265", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6", Pod:"csi-node-driver-sp9ph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali54cbb6ac1d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.315 [INFO][3553] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.315 [INFO][3553] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" iface="eth0" netns="" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.315 [INFO][3553] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.315 [INFO][3553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.340 [INFO][3560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.340 [INFO][3560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.340 [INFO][3560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.347 [WARNING][3560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.348 [INFO][3560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.349 [INFO][3560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:14.353071 env[1633]: 2025-08-13 00:57:14.351 [INFO][3553] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.353624 env[1633]: time="2025-08-13T00:57:14.353083077Z" level=info msg="TearDown network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\" successfully" Aug 13 00:57:14.353624 env[1633]: time="2025-08-13T00:57:14.353115352Z" level=info msg="StopPodSandbox for \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\" returns successfully" Aug 13 00:57:14.354158 env[1633]: time="2025-08-13T00:57:14.354099161Z" level=info msg="RemovePodSandbox for \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\"" Aug 13 00:57:14.354158 env[1633]: time="2025-08-13T00:57:14.354138163Z" level=info msg="Forcibly stopping sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\"" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.394 [WARNING][3575] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-csi--node--driver--sp9ph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3d27de55-73cd-4e90-ae6f-fad3342847f4", ResourceVersion:"1265", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"afebcdf64ae6acf1e149ae2f7b25b6d10f63700399ed5386d3efbbfa757215a6", Pod:"csi-node-driver-sp9ph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali54cbb6ac1d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.394 [INFO][3575] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.394 [INFO][3575] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" iface="eth0" netns="" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.394 [INFO][3575] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.394 [INFO][3575] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.415 [INFO][3582] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.416 [INFO][3582] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.416 [INFO][3582] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.424 [WARNING][3582] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.425 [INFO][3582] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" HandleID="k8s-pod-network.2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Workload="172.31.31.30-k8s-csi--node--driver--sp9ph-eth0" Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.427 [INFO][3582] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:14.430216 env[1633]: 2025-08-13 00:57:14.428 [INFO][3575] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302" Aug 13 00:57:14.430693 env[1633]: time="2025-08-13T00:57:14.430246689Z" level=info msg="TearDown network for sandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\" successfully" Aug 13 00:57:14.438129 env[1633]: time="2025-08-13T00:57:14.438003743Z" level=info msg="RemovePodSandbox \"2c8d90c2e14047c4e7a30915f6ffadf694e3607bc83d34abed4897c980a8a302\" returns successfully" Aug 13 00:57:14.438490 env[1633]: time="2025-08-13T00:57:14.438456886Z" level=info msg="StopPodSandbox for \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\"" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.487 [WARNING][3598] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"72a4d4d7-e528-4079-870c-844a5f57dae1", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06", Pod:"nginx-deployment-7fcdb87857-t42ts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib2af6047004", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.488 [INFO][3598] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.488 [INFO][3598] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" iface="eth0" netns="" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.488 [INFO][3598] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.488 [INFO][3598] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.509 [INFO][3608] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.509 [INFO][3608] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.509 [INFO][3608] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.516 [WARNING][3608] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.517 [INFO][3608] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.520 [INFO][3608] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:14.523065 env[1633]: 2025-08-13 00:57:14.521 [INFO][3598] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.524723 env[1633]: time="2025-08-13T00:57:14.524682082Z" level=info msg="TearDown network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\" successfully" Aug 13 00:57:14.524882 env[1633]: time="2025-08-13T00:57:14.524857043Z" level=info msg="StopPodSandbox for \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\" returns successfully" Aug 13 00:57:14.525532 env[1633]: time="2025-08-13T00:57:14.525499483Z" level=info msg="RemovePodSandbox for \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\"" Aug 13 00:57:14.525641 env[1633]: time="2025-08-13T00:57:14.525536492Z" level=info msg="Forcibly stopping sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\"" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.565 [WARNING][3623] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"72a4d4d7-e528-4079-870c-844a5f57dae1", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"a58ca432d7c4a9c103826de445cf9aa7b6c610c48ae66ffb2fd02d648054af06", Pod:"nginx-deployment-7fcdb87857-t42ts", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib2af6047004", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.566 [INFO][3623] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.566 [INFO][3623] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" iface="eth0" netns="" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.566 [INFO][3623] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.566 [INFO][3623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.587 [INFO][3630] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.587 [INFO][3630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.587 [INFO][3630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.597 [WARNING][3630] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.598 [INFO][3630] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" HandleID="k8s-pod-network.24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Workload="172.31.31.30-k8s-nginx--deployment--7fcdb87857--t42ts-eth0" Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.600 [INFO][3630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:14.603244 env[1633]: 2025-08-13 00:57:14.601 [INFO][3623] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093" Aug 13 00:57:14.603747 env[1633]: time="2025-08-13T00:57:14.603282576Z" level=info msg="TearDown network for sandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\" successfully" Aug 13 00:57:14.608385 env[1633]: time="2025-08-13T00:57:14.608325904Z" level=info msg="RemovePodSandbox \"24e9fa1f6ae6b9b762085c0375276829d27632b6db73de0c4d03b86603c20093\" returns successfully" Aug 13 00:57:15.274789 kubelet[2014]: E0813 00:57:15.274744 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:16.275903 kubelet[2014]: E0813 00:57:16.275729 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:17.276080 kubelet[2014]: E0813 00:57:17.276024 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:18.277030 kubelet[2014]: E0813 00:57:18.276988 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:19.277721 kubelet[2014]: E0813 00:57:19.277644 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:20.278272 kubelet[2014]: E0813 00:57:20.278221 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:21.279264 kubelet[2014]: E0813 00:57:21.279212 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:22.279394 kubelet[2014]: E0813 00:57:22.279344 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:23.279490 kubelet[2014]: E0813 00:57:23.279450 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:24.029018 systemd[1]: Created slice kubepods-besteffort-pode1678e9c_13de_4eca_b951_c70d9a266aec.slice. Aug 13 00:57:24.144718 kubelet[2014]: I0813 00:57:24.144675 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-22d2f2f7-6a81-4932-83ba-c90678e295aa\" (UniqueName: \"kubernetes.io/nfs/e1678e9c-13de-4eca-b951-c70d9a266aec-pvc-22d2f2f7-6a81-4932-83ba-c90678e295aa\") pod \"test-pod-1\" (UID: \"e1678e9c-13de-4eca-b951-c70d9a266aec\") " pod="default/test-pod-1" Aug 13 00:57:24.144977 kubelet[2014]: I0813 00:57:24.144946 2014 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pjgxt\" (UniqueName: \"kubernetes.io/projected/e1678e9c-13de-4eca-b951-c70d9a266aec-kube-api-access-pjgxt\") pod \"test-pod-1\" (UID: \"e1678e9c-13de-4eca-b951-c70d9a266aec\") " pod="default/test-pod-1" Aug 13 00:57:24.280439 kubelet[2014]: E0813 00:57:24.279939 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:24.294740 kernel: Failed to create system directory netfs Aug 13 00:57:24.294896 kernel: kauditd_printk_skb: 68 callbacks suppressed Aug 13 00:57:24.294931 kernel: audit: type=1400 audit(1755046644.279:806): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.294964 kernel: Failed to create system directory netfs Aug 13 00:57:24.294989 kernel: audit: type=1400 audit(1755046644.279:806): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.295024 kernel: Failed to create system directory netfs Aug 13 00:57:24.279000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.279000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.303323 kernel: audit: type=1400 audit(1755046644.279:806): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.303458 kernel: Failed to create system directory netfs Aug 13 00:57:24.279000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.318729 kernel: audit: type=1400 audit(1755046644.279:806): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.279000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.279000 audit[3641]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562a269e15e0 a1=153bc a2=5629e7c672b0 a3=5 items=0 ppid=50 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.339435 kernel: audit: type=1300 audit(1755046644.279:806): arch=c000003e syscall=175 success=yes exit=0 a0=562a269e15e0 a1=153bc a2=5629e7c672b0 a3=5 items=0 ppid=50 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.339576 kernel: Failed to create system directory fscache Aug 13 00:57:24.339612 kernel: audit: type=1327 audit(1755046644.279:806): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.339644 kernel: Failed to create system directory fscache Aug 13 00:57:24.279000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.347937 kernel: audit: type=1400 audit(1755046644.326:807): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.348053 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.356372 kernel: audit: type=1400 audit(1755046644.326:807): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.356507 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.364764 kernel: audit: type=1400 audit(1755046644.326:807): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.364910 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.373447 kernel: audit: type=1400 audit(1755046644.326:807): avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.373561 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.376660 kernel: Failed to create system directory fscache Aug 13 00:57:24.376730 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.379964 kernel: Failed to create system directory fscache Aug 13 00:57:24.380026 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.382903 kernel: Failed to create system directory fscache Aug 13 00:57:24.382959 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.385738 kernel: Failed to create system directory fscache Aug 13 00:57:24.385805 kernel: Failed to create system directory fscache Aug 13 00:57:24.326000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.326000 audit[3641]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562a26bf69c0 a1=4c0fc a2=5629e7c672b0 a3=5 items=0 ppid=50 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.326000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.390206 kernel: FS-Cache: Loaded Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.431257 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.431341 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.431374 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.433951 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.434012 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.436522 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.436695 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.439064 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.439138 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.441609 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.441679 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.443970 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.444102 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.446284 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.446333 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.448544 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.448606 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.450821 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.450888 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.453630 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.453695 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.455177 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.457596 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.458989 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.462488 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.462581 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.462621 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.465022 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.465120 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.466261 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.468635 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.468776 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.471050 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.471130 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.475220 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.475278 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.478061 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.478106 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.479071 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.479122 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.480954 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.481015 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.482772 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.482830 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.484608 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.484655 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.486434 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.486480 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.488262 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.488325 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.489249 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.490976 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.491028 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.492800 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.492856 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.494612 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.494664 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.496436 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.496494 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.498221 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.498298 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.500121 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.500183 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.501943 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.501996 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.503846 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.503897 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.505701 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.505754 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.507556 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.507614 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.509438 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.509494 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.511284 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.511342 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.514020 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.514066 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.514093 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.515850 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.515909 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.517774 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.517825 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.519647 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.519705 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.521534 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.521580 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.523373 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.523426 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.525221 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.527047 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.527110 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.527137 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.528920 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.529038 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.530740 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.530791 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.536437 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.536535 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.536585 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.536609 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.536646 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.538980 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.539065 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.540863 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.540924 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.542718 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.542779 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.544576 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.544629 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.546422 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.546482 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.548248 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.548298 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.550067 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.550114 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.551946 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.552028 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.553812 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.553877 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.555696 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.555794 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.557594 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.557642 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.559516 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.559561 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.413000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.561377 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.572224 kernel: RPC: Registered named UNIX socket transport module. Aug 13 00:57:24.572339 kernel: RPC: Registered udp transport module. Aug 13 00:57:24.572373 kernel: RPC: Registered tcp transport module. Aug 13 00:57:24.573988 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Aug 13 00:57:24.413000 audit[3641]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562a26c42ad0 a1=1a81bc a2=5629e7c672b0 a3=5 items=6 ppid=50 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.413000 audit: CWD cwd="/" Aug 13 00:57:24.413000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.413000 audit: PATH item=1 name=(null) inode=23982 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.413000 audit: PATH item=2 name=(null) inode=23982 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.413000 audit: PATH item=3 name=(null) inode=23983 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.413000 audit: PATH item=4 name=(null) inode=23982 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.413000 audit: PATH item=5 name=(null) inode=23984 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.413000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.622042 kernel: Failed to create system directory nfs Aug 13 00:57:24.622094 kernel: Failed to create system directory nfs Aug 13 00:57:24.622120 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.623965 kernel: Failed to create system directory nfs Aug 13 00:57:24.624015 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.625785 kernel: Failed to create system directory nfs Aug 13 00:57:24.625828 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.627595 kernel: Failed to create system directory nfs Aug 13 00:57:24.627645 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.628591 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.630440 kernel: Failed to create system directory nfs Aug 13 00:57:24.630483 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.632388 kernel: Failed to create system directory nfs Aug 13 00:57:24.632459 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.634266 kernel: Failed to create system directory nfs Aug 13 00:57:24.634325 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.635530 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.637882 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.638886 kernel: Failed to create system directory nfs Aug 13 00:57:24.638941 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.640761 kernel: Failed to create system directory nfs Aug 13 00:57:24.640808 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.642611 kernel: Failed to create system directory nfs Aug 13 00:57:24.642658 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.644438 kernel: Failed to create system directory nfs Aug 13 00:57:24.644489 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.646276 kernel: Failed to create system directory nfs Aug 13 00:57:24.646333 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.649031 kernel: Failed to create system directory nfs Aug 13 00:57:24.649082 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.651002 kernel: Failed to create system directory nfs Aug 13 00:57:24.651067 kernel: Failed to create system directory nfs Aug 13 00:57:24.651096 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.652926 kernel: Failed to create system directory nfs Aug 13 00:57:24.652977 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.654714 kernel: Failed to create system directory nfs Aug 13 00:57:24.654760 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.656558 kernel: Failed to create system directory nfs Aug 13 00:57:24.656625 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.658415 kernel: Failed to create system directory nfs Aug 13 00:57:24.658481 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.660279 kernel: Failed to create system directory nfs Aug 13 00:57:24.660338 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.662034 kernel: Failed to create system directory nfs Aug 13 00:57:24.662078 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.663805 kernel: Failed to create system directory nfs Aug 13 00:57:24.663853 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.665564 kernel: Failed to create system directory nfs Aug 13 00:57:24.665610 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.667346 kernel: Failed to create system directory nfs Aug 13 00:57:24.667394 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.669988 kernel: Failed to create system directory nfs Aug 13 00:57:24.670047 kernel: Failed to create system directory nfs Aug 13 00:57:24.670078 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.671807 kernel: Failed to create system directory nfs Aug 13 00:57:24.671858 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.673593 kernel: Failed to create system directory nfs Aug 13 00:57:24.673640 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.675352 kernel: Failed to create system directory nfs Aug 13 00:57:24.675397 kernel: Failed to create system directory nfs Aug 13 00:57:24.608000 audit[3641]: AVC avc: denied { confidentiality } for pid=3641 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.608000 audit[3641]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562a26e63af0 a1=16ed54 a2=5629e7c672b0 a3=5 items=0 ppid=50 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.608000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.699276 kernel: FS-Cache: Netfs 'nfs' registered for caching Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.747596 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.747657 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.747687 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.749536 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.749604 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.751330 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.751380 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.753215 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.753268 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.755010 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.755069 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.756857 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.756905 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.758735 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.758802 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.760538 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.760585 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.762391 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.762451 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.764263 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.764310 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.767007 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.767054 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.767082 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.768951 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.769018 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.770752 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.770800 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.772628 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.772681 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.774496 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.774545 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.776361 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.776411 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.778300 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.778353 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.781244 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.781296 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.781321 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.782948 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.783002 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.784764 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.784814 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.786571 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.786627 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.792648 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.792760 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.793860 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.793905 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.795254 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.796835 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.796880 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.797754 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.798698 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.799608 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.800556 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.801489 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.802410 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.803322 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.804277 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.806089 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.806142 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.807894 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.807946 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.809913 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.810903 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.810952 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.811957 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.812886 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.814753 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.814795 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.815688 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.816627 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.818439 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.818479 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.819395 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.820361 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.822273 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.822314 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.824136 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.824205 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.825060 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.825971 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.826876 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.827828 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.828734 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.830653 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.830695 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.831574 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.832497 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.833412 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.834327 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.836135 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.836176 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.728000 audit[3646]: AVC avc: denied { confidentiality } for pid=3646 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.984917 kernel: NFS: Registering the id_resolver key type Aug 13 00:57:24.985044 kernel: Key type id_resolver registered Aug 13 00:57:24.985070 kernel: Key type id_legacy registered Aug 13 00:57:24.728000 audit[3646]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb1b2b56010 a1=2095ac a2=563241fcc2b0 a3=5 items=0 ppid=50 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.728000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.002290 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.002369 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.002400 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.005144 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.005209 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.005237 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.007094 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.007162 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.009050 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.009107 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.011031 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.011111 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.012992 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.013070 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.014924 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.014997 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.016851 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.016919 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.018777 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.018839 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.020692 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.020769 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.022666 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.022727 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.024541 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.024601 kernel: Failed to create system directory rpcgss Aug 13 00:57:24.995000 audit[3647]: AVC avc: denied { confidentiality } for pid=3647 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.995000 audit[3647]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fde22139010 a1=70bac a2=5644aa0b52b0 a3=5 items=0 ppid=50 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.995000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Aug 13 00:57:25.050418 nfsidmap[3654]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Aug 13 00:57:25.056253 nfsidmap[3655]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Aug 13 00:57:25.063000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.063000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.063000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.063000 audit[1819]: AVC avc: denied { watch_reads } for pid=1819 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.063000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55cf2e804f20 a2=10 a3=b49993eded8eab8d items=0 ppid=1 pid=1819 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.063000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:57:25.063000 audit[1819]: AVC avc: denied { watch_reads } for pid=1819 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.063000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55cf2e804f20 a2=10 a3=b49993eded8eab8d items=0 ppid=1 pid=1819 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.063000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:57:25.063000 audit[1819]: AVC avc: denied { watch_reads } for pid=1819 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.063000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55cf2e804f20 a2=10 a3=b49993eded8eab8d items=0 ppid=1 pid=1819 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.063000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:57:25.232047 env[1633]: time="2025-08-13T00:57:25.231993272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e1678e9c-13de-4eca-b951-c70d9a266aec,Namespace:default,Attempt:0,}" Aug 13 00:57:25.281620 kubelet[2014]: E0813 00:57:25.281570 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:25.409997 (udev-worker)[3648]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:57:25.416362 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:57:25.416466 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Aug 13 00:57:25.412199 systemd-networkd[1360]: cali5ec59c6bf6e: Link UP Aug 13 00:57:25.415949 systemd-networkd[1360]: cali5ec59c6bf6e: Gained carrier Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.303 [INFO][3656] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.30-k8s-test--pod--1-eth0 default e1678e9c-13de-4eca-b951-c70d9a266aec 1416 0 2025-08-13 00:56:55 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.30 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.303 [INFO][3656] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-eth0" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.331 [INFO][3670] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" HandleID="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Workload="172.31.31.30-k8s-test--pod--1-eth0" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.331 [INFO][3670] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" HandleID="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Workload="172.31.31.30-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5030), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.30", "pod":"test-pod-1", "timestamp":"2025-08-13 00:57:25.331014741 +0000 UTC"}, Hostname:"172.31.31.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.331 [INFO][3670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.331 [INFO][3670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.331 [INFO][3670] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.30' Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.358 [INFO][3670] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.368 [INFO][3670] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.373 [INFO][3670] ipam/ipam.go 511: Trying affinity for 192.168.36.128/26 host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.376 [INFO][3670] ipam/ipam.go 158: Attempting to load block cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.379 [INFO][3670] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.379 [INFO][3670] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.381 [INFO][3670] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.388 [INFO][3670] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.405 [INFO][3670] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.36.132/26] block=192.168.36.128/26 handle="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.405 [INFO][3670] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.36.132/26] handle="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" host="172.31.31.30" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.405 [INFO][3670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.405 [INFO][3670] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.36.132/26] IPv6=[] ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" HandleID="k8s-pod-network.14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Workload="172.31.31.30-k8s-test--pod--1-eth0" Aug 13 00:57:25.446388 env[1633]: 2025-08-13 00:57:25.407 [INFO][3656] cni-plugin/k8s.go 418: Populated endpoint ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e1678e9c-13de-4eca-b951-c70d9a266aec", ResourceVersion:"1416", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:25.447219 env[1633]: 2025-08-13 00:57:25.407 [INFO][3656] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.36.132/32] ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-eth0" Aug 13 00:57:25.447219 env[1633]: 2025-08-13 00:57:25.407 [INFO][3656] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-eth0" Aug 13 00:57:25.447219 env[1633]: 2025-08-13 00:57:25.417 [INFO][3656] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-eth0" Aug 13 00:57:25.447219 env[1633]: 2025-08-13 00:57:25.425 [INFO][3656] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.30-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e1678e9c-13de-4eca-b951-c70d9a266aec", ResourceVersion:"1416", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.30", ContainerID:"14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"a2:81:47:33:f5:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:25.447219 env[1633]: 2025-08-13 00:57:25.444 [INFO][3656] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.30-k8s-test--pod--1-eth0" Aug 13 00:57:25.459089 env[1633]: time="2025-08-13T00:57:25.458987918Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:57:25.459301 env[1633]: time="2025-08-13T00:57:25.459046764Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:57:25.459301 env[1633]: time="2025-08-13T00:57:25.459077009Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:57:25.459598 env[1633]: time="2025-08-13T00:57:25.459495120Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a pid=3687 runtime=io.containerd.runc.v2 Aug 13 00:57:25.482728 systemd[1]: run-containerd-runc-k8s.io-14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a-runc.83I2W8.mount: Deactivated successfully. Aug 13 00:57:25.490462 systemd[1]: Started cri-containerd-14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a.scope. Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.517000 audit: BPF prog-id=129 op=LOAD Aug 13 00:57:25.518000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.518000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3687 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643766616662323631303136303337646332373739656266663433 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3687 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643766616662323631303136303337646332373739656266663433 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.519000 audit: BPF prog-id=130 op=LOAD Aug 13 00:57:25.519000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002fc6a0 items=0 ppid=3687 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643766616662323631303136303337646332373739656266663433 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.520000 audit: BPF prog-id=131 op=LOAD Aug 13 00:57:25.520000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002fc6e8 items=0 ppid=3687 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643766616662323631303136303337646332373739656266663433 Aug 13 00:57:25.521000 audit: BPF prog-id=131 op=UNLOAD Aug 13 00:57:25.521000 audit: BPF prog-id=130 op=UNLOAD Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:25.521000 audit: BPF prog-id=132 op=LOAD Aug 13 00:57:25.522000 audit[3717]: NETFILTER_CFG table=filter:98 family=2 entries=46 op=nft_register_chain pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:57:25.522000 audit[3717]: SYSCALL arch=c000003e syscall=46 success=yes exit=23188 a0=3 a1=7ffd5762d4a0 a2=0 a3=7ffd5762d48c items=0 ppid=2645 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.522000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:57:25.521000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002fcaf8 items=0 ppid=3687 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134643766616662323631303136303337646332373739656266663433 Aug 13 00:57:25.563849 env[1633]: time="2025-08-13T00:57:25.563800464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e1678e9c-13de-4eca-b951-c70d9a266aec,Namespace:default,Attempt:0,} returns sandbox id \"14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a\"" Aug 13 00:57:25.565617 env[1633]: time="2025-08-13T00:57:25.565580198Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Aug 13 00:57:26.005320 env[1633]: time="2025-08-13T00:57:26.005271503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.009552 env[1633]: time="2025-08-13T00:57:26.009507808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.012503 env[1633]: time="2025-08-13T00:57:26.012460703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.015308 env[1633]: time="2025-08-13T00:57:26.015266530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:a6969d434cb816d30787e9f7ab16b632e12dc05a2c8f4dae701d83ef2199c985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.016125 env[1633]: time="2025-08-13T00:57:26.016085466Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305\"" Aug 13 00:57:26.019123 env[1633]: time="2025-08-13T00:57:26.019088182Z" level=info msg="CreateContainer within sandbox \"14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a\" for container &ContainerMetadata{Name:test,Attempt:0,}" Aug 13 00:57:26.044332 env[1633]: time="2025-08-13T00:57:26.044265218Z" level=info msg="CreateContainer within sandbox \"14d7fafb261016037dc2779ebff43a2e975d50e41c878806293cbc991518d78a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b157ae1685efb09c9312733e25ed7cf4b13c10db24ffd5f24bb8a27dec6807b0\"" Aug 13 00:57:26.044906 env[1633]: time="2025-08-13T00:57:26.044880074Z" level=info msg="StartContainer for \"b157ae1685efb09c9312733e25ed7cf4b13c10db24ffd5f24bb8a27dec6807b0\"" Aug 13 00:57:26.060987 systemd[1]: Started cri-containerd-b157ae1685efb09c9312733e25ed7cf4b13c10db24ffd5f24bb8a27dec6807b0.scope. Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit: BPF prog-id=133 op=LOAD Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3687 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353761653136383565666230396339333132373333653235656437 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3687 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353761653136383565666230396339333132373333653235656437 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.074000 audit: BPF prog-id=134 op=LOAD Aug 13 00:57:26.074000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029c550 items=0 ppid=3687 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353761653136383565666230396339333132373333653235656437 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit: BPF prog-id=135 op=LOAD Aug 13 00:57:26.075000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029c598 items=0 ppid=3687 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353761653136383565666230396339333132373333653235656437 Aug 13 00:57:26.075000 audit: BPF prog-id=135 op=UNLOAD Aug 13 00:57:26.075000 audit: BPF prog-id=134 op=UNLOAD Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.075000 audit: BPF prog-id=136 op=LOAD Aug 13 00:57:26.075000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029c9a8 items=0 ppid=3687 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353761653136383565666230396339333132373333653235656437 Aug 13 00:57:26.093473 env[1633]: time="2025-08-13T00:57:26.093425884Z" level=info msg="StartContainer for \"b157ae1685efb09c9312733e25ed7cf4b13c10db24ffd5f24bb8a27dec6807b0\" returns successfully" Aug 13 00:57:26.282652 kubelet[2014]: E0813 00:57:26.282526 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:27.020430 systemd-networkd[1360]: cali5ec59c6bf6e: Gained IPv6LL Aug 13 00:57:27.283277 kubelet[2014]: E0813 00:57:27.283145 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:28.284053 kubelet[2014]: E0813 00:57:28.283998 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:29.284966 kubelet[2014]: E0813 00:57:29.284915 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:30.285852 kubelet[2014]: E0813 00:57:30.285777 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:31.286316 kubelet[2014]: E0813 00:57:31.286254 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:32.287214 kubelet[2014]: E0813 00:57:32.287163 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:33.288004 kubelet[2014]: E0813 00:57:33.287947 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:33.538228 systemd[1]: run-containerd-runc-k8s.io-61fcf59e693bb4d36edb9617f39f1e41a0c9c47802d40bf970ef769c92fce916-runc.gU0vCV.mount: Deactivated successfully. Aug 13 00:57:34.220530 kubelet[2014]: E0813 00:57:34.220458 2014 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:34.288359 kubelet[2014]: E0813 00:57:34.288319 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:35.289226 kubelet[2014]: E0813 00:57:35.289127 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:36.289390 kubelet[2014]: E0813 00:57:36.289308 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:37.290419 kubelet[2014]: E0813 00:57:37.290358 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:38.290667 kubelet[2014]: E0813 00:57:38.290626 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:39.291768 kubelet[2014]: E0813 00:57:39.291626 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:40.292945 kubelet[2014]: E0813 00:57:40.292892 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:41.293327 kubelet[2014]: E0813 00:57:41.293275 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:42.293828 kubelet[2014]: E0813 00:57:42.293784 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:43.294013 kubelet[2014]: E0813 00:57:43.293963 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:44.295161 kubelet[2014]: E0813 00:57:44.295104 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:45.295431 kubelet[2014]: E0813 00:57:45.295390 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:45.859577 kubelet[2014]: E0813 00:57:45.859511 2014 controller.go:195] "Failed to update lease" err="Put \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Aug 13 00:57:46.295996 kubelet[2014]: E0813 00:57:46.295922 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:47.296928 kubelet[2014]: E0813 00:57:47.296870 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:48.297679 kubelet[2014]: E0813 00:57:48.297621 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:49.297880 kubelet[2014]: E0813 00:57:49.297812 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:50.298588 kubelet[2014]: E0813 00:57:50.298453 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:51.299530 kubelet[2014]: E0813 00:57:51.299474 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:52.299942 kubelet[2014]: E0813 00:57:52.299891 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:53.300441 kubelet[2014]: E0813 00:57:53.300395 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:54.220242 kubelet[2014]: E0813 00:57:54.220178 2014 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:54.301086 kubelet[2014]: E0813 00:57:54.301025 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:55.301987 kubelet[2014]: E0813 00:57:55.301944 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:55.859875 kubelet[2014]: E0813 00:57:55.859793 2014 controller.go:195] "Failed to update lease" err="Put \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": context deadline exceeded" Aug 13 00:57:56.302639 kubelet[2014]: E0813 00:57:56.302593 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:57.303371 kubelet[2014]: E0813 00:57:57.303327 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:58.304075 kubelet[2014]: E0813 00:57:58.304010 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:59.305139 kubelet[2014]: E0813 00:57:59.305063 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:00.305847 kubelet[2014]: E0813 00:58:00.305799 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:01.306518 kubelet[2014]: E0813 00:58:01.306443 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:02.306909 kubelet[2014]: E0813 00:58:02.306862 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:03.307548 kubelet[2014]: E0813 00:58:03.307490 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:03.542082 systemd[1]: run-containerd-runc-k8s.io-61fcf59e693bb4d36edb9617f39f1e41a0c9c47802d40bf970ef769c92fce916-runc.fibto5.mount: Deactivated successfully. Aug 13 00:58:04.307902 kubelet[2014]: E0813 00:58:04.307853 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:05.308322 kubelet[2014]: E0813 00:58:05.308275 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:05.860988 kubelet[2014]: E0813 00:58:05.860937 2014 controller.go:195] "Failed to update lease" err="Put \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Aug 13 00:58:06.308805 kubelet[2014]: E0813 00:58:06.308753 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:07.309225 kubelet[2014]: E0813 00:58:07.309162 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:08.309511 kubelet[2014]: E0813 00:58:08.309472 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:09.310644 kubelet[2014]: E0813 00:58:09.310586 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:10.311421 kubelet[2014]: E0813 00:58:10.311373 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:11.312316 kubelet[2014]: E0813 00:58:11.312271 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:12.312904 kubelet[2014]: E0813 00:58:12.312847 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:12.849235 kubelet[2014]: E0813 00:58:12.849174 2014 controller.go:195] "Failed to update lease" err="Put \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": unexpected EOF" Aug 13 00:58:12.849922 kubelet[2014]: E0813 00:58:12.849888 2014 controller.go:195] "Failed to update lease" err="Put \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": dial tcp 172.31.23.116:6443: connect: connection refused" Aug 13 00:58:12.850062 kubelet[2014]: I0813 00:58:12.849934 2014 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Aug 13 00:58:12.850374 kubelet[2014]: E0813 00:58:12.850337 2014 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": dial tcp 172.31.23.116:6443: connect: connection refused" interval="200ms" Aug 13 00:58:13.053307 kubelet[2014]: E0813 00:58:13.053259 2014 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": dial tcp 172.31.23.116:6443: connect: connection refused" interval="400ms" Aug 13 00:58:13.313032 kubelet[2014]: E0813 00:58:13.312975 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:13.454698 kubelet[2014]: E0813 00:58:13.454644 2014 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": dial tcp 172.31.23.116:6443: connect: connection refused" interval="800ms" Aug 13 00:58:14.220333 kubelet[2014]: E0813 00:58:14.220277 2014 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:14.313338 kubelet[2014]: E0813 00:58:14.313297 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:15.314166 kubelet[2014]: E0813 00:58:15.314094 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:16.315056 kubelet[2014]: E0813 00:58:16.314989 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:17.316155 kubelet[2014]: E0813 00:58:17.316100 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:18.316806 kubelet[2014]: E0813 00:58:18.316722 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:19.317677 kubelet[2014]: E0813 00:58:19.317627 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:20.318834 kubelet[2014]: E0813 00:58:20.318786 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:21.319127 kubelet[2014]: E0813 00:58:21.319085 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:22.320043 kubelet[2014]: E0813 00:58:22.320000 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:23.321010 kubelet[2014]: E0813 00:58:23.320958 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:24.256391 kubelet[2014]: E0813 00:58:24.256339 2014 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.23.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.30?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Aug 13 00:58:24.321637 kubelet[2014]: E0813 00:58:24.321563 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:25.322388 kubelet[2014]: E0813 00:58:25.322340 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:26.322621 kubelet[2014]: E0813 00:58:26.322579 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:27.323059 kubelet[2014]: E0813 00:58:27.322984 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:58:28.324007 kubelet[2014]: E0813 00:58:28.323947 2014 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"