Aug 13 00:03:01.008502 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Aug 13 00:03:01.008540 kernel: Linux version 5.15.189-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Tue Aug 12 22:50:30 -00 2025 Aug 13 00:03:01.008563 kernel: efi: EFI v2.70 by EDK II Aug 13 00:03:01.008579 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Aug 13 00:03:01.008593 kernel: ACPI: Early table checksum verification disabled Aug 13 00:03:01.008607 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Aug 13 00:03:01.008623 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Aug 13 00:03:01.008637 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Aug 13 00:03:01.008651 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Aug 13 00:03:01.008664 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Aug 13 00:03:01.008683 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Aug 13 00:03:01.008697 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Aug 13 00:03:01.008711 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Aug 13 00:03:01.008725 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Aug 13 00:03:01.008741 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Aug 13 00:03:01.008761 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Aug 13 00:03:01.008775 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Aug 13 00:03:01.008790 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Aug 13 00:03:01.008804 kernel: printk: bootconsole [uart0] enabled Aug 13 00:03:01.008819 kernel: NUMA: Failed to initialise from firmware Aug 13 00:03:01.008833 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Aug 13 00:03:01.008848 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Aug 13 00:03:01.008863 kernel: Zone ranges: Aug 13 00:03:01.008878 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Aug 13 00:03:01.008892 kernel: DMA32 empty Aug 13 00:03:01.008907 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Aug 13 00:03:01.008925 kernel: Movable zone start for each node Aug 13 00:03:01.008940 kernel: Early memory node ranges Aug 13 00:03:01.008954 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Aug 13 00:03:01.008969 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Aug 13 00:03:01.008983 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Aug 13 00:03:01.008998 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Aug 13 00:03:01.009012 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Aug 13 00:03:01.009027 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Aug 13 00:03:01.009041 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Aug 13 00:03:01.009056 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Aug 13 00:03:01.009070 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Aug 13 00:03:01.009085 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Aug 13 00:03:01.009104 kernel: psci: probing for conduit method from ACPI. Aug 13 00:03:01.009137 kernel: psci: PSCIv1.0 detected in firmware. Aug 13 00:03:01.009164 kernel: psci: Using standard PSCI v0.2 function IDs Aug 13 00:03:01.009181 kernel: psci: Trusted OS migration not required Aug 13 00:03:01.009197 kernel: psci: SMC Calling Convention v1.1 Aug 13 00:03:01.009216 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Aug 13 00:03:01.009232 kernel: ACPI: SRAT not present Aug 13 00:03:01.009247 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Aug 13 00:03:01.009263 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Aug 13 00:03:01.009279 kernel: pcpu-alloc: [0] 0 [0] 1 Aug 13 00:03:01.009294 kernel: Detected PIPT I-cache on CPU0 Aug 13 00:03:01.009309 kernel: CPU features: detected: GIC system register CPU interface Aug 13 00:03:01.009325 kernel: CPU features: detected: Spectre-v2 Aug 13 00:03:01.009340 kernel: CPU features: detected: Spectre-v3a Aug 13 00:03:01.009355 kernel: CPU features: detected: Spectre-BHB Aug 13 00:03:01.009370 kernel: CPU features: kernel page table isolation forced ON by KASLR Aug 13 00:03:01.009390 kernel: CPU features: detected: Kernel page table isolation (KPTI) Aug 13 00:03:01.009405 kernel: CPU features: detected: ARM erratum 1742098 Aug 13 00:03:01.009421 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Aug 13 00:03:01.009436 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Aug 13 00:03:01.009452 kernel: Policy zone: Normal Aug 13 00:03:01.009469 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=32404c0887e5b8a80b0f069916a8040bfd969c7a8f47a2db1168b24bc04220cc Aug 13 00:03:01.009486 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Aug 13 00:03:01.009501 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Aug 13 00:03:01.009517 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Aug 13 00:03:01.009532 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Aug 13 00:03:01.009551 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Aug 13 00:03:01.009568 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7588K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Aug 13 00:03:01.009584 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Aug 13 00:03:01.009599 kernel: trace event string verifier disabled Aug 13 00:03:01.009614 kernel: rcu: Preemptible hierarchical RCU implementation. Aug 13 00:03:01.009630 kernel: rcu: RCU event tracing is enabled. Aug 13 00:03:01.009646 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Aug 13 00:03:01.009662 kernel: Trampoline variant of Tasks RCU enabled. Aug 13 00:03:01.009677 kernel: Tracing variant of Tasks RCU enabled. Aug 13 00:03:01.009692 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Aug 13 00:03:01.009708 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Aug 13 00:03:01.009723 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Aug 13 00:03:01.009742 kernel: GICv3: 96 SPIs implemented Aug 13 00:03:01.009757 kernel: GICv3: 0 Extended SPIs implemented Aug 13 00:03:01.009773 kernel: GICv3: Distributor has no Range Selector support Aug 13 00:03:01.009788 kernel: Root IRQ handler: gic_handle_irq Aug 13 00:03:01.009803 kernel: GICv3: 16 PPIs implemented Aug 13 00:03:01.009818 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Aug 13 00:03:01.009833 kernel: ACPI: SRAT not present Aug 13 00:03:01.009848 kernel: ITS [mem 0x10080000-0x1009ffff] Aug 13 00:03:01.009863 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Aug 13 00:03:01.009879 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Aug 13 00:03:01.009894 kernel: GICv3: using LPI property table @0x00000004000b0000 Aug 13 00:03:01.009914 kernel: ITS: Using hypervisor restricted LPI range [128] Aug 13 00:03:01.009948 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Aug 13 00:03:01.009965 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Aug 13 00:03:01.009981 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Aug 13 00:03:01.009997 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Aug 13 00:03:01.010012 kernel: Console: colour dummy device 80x25 Aug 13 00:03:01.010028 kernel: printk: console [tty1] enabled Aug 13 00:03:01.010043 kernel: ACPI: Core revision 20210730 Aug 13 00:03:01.010059 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Aug 13 00:03:01.010076 kernel: pid_max: default: 32768 minimum: 301 Aug 13 00:03:01.010096 kernel: LSM: Security Framework initializing Aug 13 00:03:01.010112 kernel: SELinux: Initializing. Aug 13 00:03:01.014283 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Aug 13 00:03:01.014303 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Aug 13 00:03:01.014320 kernel: rcu: Hierarchical SRCU implementation. Aug 13 00:03:01.014336 kernel: Platform MSI: ITS@0x10080000 domain created Aug 13 00:03:01.014352 kernel: PCI/MSI: ITS@0x10080000 domain created Aug 13 00:03:01.014368 kernel: Remapping and enabling EFI services. Aug 13 00:03:01.014384 kernel: smp: Bringing up secondary CPUs ... Aug 13 00:03:01.014400 kernel: Detected PIPT I-cache on CPU1 Aug 13 00:03:01.014426 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Aug 13 00:03:01.014442 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Aug 13 00:03:01.014458 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Aug 13 00:03:01.014474 kernel: smp: Brought up 1 node, 2 CPUs Aug 13 00:03:01.014489 kernel: SMP: Total of 2 processors activated. Aug 13 00:03:01.014505 kernel: CPU features: detected: 32-bit EL0 Support Aug 13 00:03:01.014521 kernel: CPU features: detected: 32-bit EL1 Support Aug 13 00:03:01.014536 kernel: CPU features: detected: CRC32 instructions Aug 13 00:03:01.014551 kernel: CPU: All CPU(s) started at EL1 Aug 13 00:03:01.014572 kernel: alternatives: patching kernel code Aug 13 00:03:01.014588 kernel: devtmpfs: initialized Aug 13 00:03:01.014615 kernel: KASLR disabled due to lack of seed Aug 13 00:03:01.014636 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Aug 13 00:03:01.014652 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Aug 13 00:03:01.014668 kernel: pinctrl core: initialized pinctrl subsystem Aug 13 00:03:01.014684 kernel: SMBIOS 3.0.0 present. Aug 13 00:03:01.014700 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Aug 13 00:03:01.014716 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Aug 13 00:03:01.014733 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Aug 13 00:03:01.014750 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Aug 13 00:03:01.014772 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Aug 13 00:03:01.014788 kernel: audit: initializing netlink subsys (disabled) Aug 13 00:03:01.014804 kernel: audit: type=2000 audit(0.296:1): state=initialized audit_enabled=0 res=1 Aug 13 00:03:01.014821 kernel: thermal_sys: Registered thermal governor 'step_wise' Aug 13 00:03:01.014837 kernel: cpuidle: using governor menu Aug 13 00:03:01.014858 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Aug 13 00:03:01.014875 kernel: ASID allocator initialised with 32768 entries Aug 13 00:03:01.014891 kernel: ACPI: bus type PCI registered Aug 13 00:03:01.014907 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Aug 13 00:03:01.014923 kernel: Serial: AMBA PL011 UART driver Aug 13 00:03:01.014939 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Aug 13 00:03:01.014955 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Aug 13 00:03:01.014971 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Aug 13 00:03:01.014987 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Aug 13 00:03:01.015008 kernel: cryptd: max_cpu_qlen set to 1000 Aug 13 00:03:01.015025 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Aug 13 00:03:01.015041 kernel: ACPI: Added _OSI(Module Device) Aug 13 00:03:01.015057 kernel: ACPI: Added _OSI(Processor Device) Aug 13 00:03:01.015073 kernel: ACPI: Added _OSI(Processor Aggregator Device) Aug 13 00:03:01.015089 kernel: ACPI: Added _OSI(Linux-Dell-Video) Aug 13 00:03:01.015105 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Aug 13 00:03:01.015142 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Aug 13 00:03:01.015162 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Aug 13 00:03:01.015179 kernel: ACPI: Interpreter enabled Aug 13 00:03:01.015201 kernel: ACPI: Using GIC for interrupt routing Aug 13 00:03:01.015217 kernel: ACPI: MCFG table detected, 1 entries Aug 13 00:03:01.015234 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Aug 13 00:03:01.015507 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Aug 13 00:03:01.015694 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Aug 13 00:03:01.015875 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Aug 13 00:03:01.016051 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Aug 13 00:03:01.016297 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Aug 13 00:03:01.016322 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Aug 13 00:03:01.016340 kernel: acpiphp: Slot [1] registered Aug 13 00:03:01.016356 kernel: acpiphp: Slot [2] registered Aug 13 00:03:01.016372 kernel: acpiphp: Slot [3] registered Aug 13 00:03:01.016388 kernel: acpiphp: Slot [4] registered Aug 13 00:03:01.016404 kernel: acpiphp: Slot [5] registered Aug 13 00:03:01.016419 kernel: acpiphp: Slot [6] registered Aug 13 00:03:01.016435 kernel: acpiphp: Slot [7] registered Aug 13 00:03:01.016457 kernel: acpiphp: Slot [8] registered Aug 13 00:03:01.016473 kernel: acpiphp: Slot [9] registered Aug 13 00:03:01.016489 kernel: acpiphp: Slot [10] registered Aug 13 00:03:01.016505 kernel: acpiphp: Slot [11] registered Aug 13 00:03:01.016521 kernel: acpiphp: Slot [12] registered Aug 13 00:03:01.016537 kernel: acpiphp: Slot [13] registered Aug 13 00:03:01.016553 kernel: acpiphp: Slot [14] registered Aug 13 00:03:01.016569 kernel: acpiphp: Slot [15] registered Aug 13 00:03:01.016585 kernel: acpiphp: Slot [16] registered Aug 13 00:03:01.016606 kernel: acpiphp: Slot [17] registered Aug 13 00:03:01.016622 kernel: acpiphp: Slot [18] registered Aug 13 00:03:01.016638 kernel: acpiphp: Slot [19] registered Aug 13 00:03:01.016654 kernel: acpiphp: Slot [20] registered Aug 13 00:03:01.016670 kernel: acpiphp: Slot [21] registered Aug 13 00:03:01.016686 kernel: acpiphp: Slot [22] registered Aug 13 00:03:01.016702 kernel: acpiphp: Slot [23] registered Aug 13 00:03:01.016719 kernel: acpiphp: Slot [24] registered Aug 13 00:03:01.016734 kernel: acpiphp: Slot [25] registered Aug 13 00:03:01.016750 kernel: acpiphp: Slot [26] registered Aug 13 00:03:01.016771 kernel: acpiphp: Slot [27] registered Aug 13 00:03:01.016787 kernel: acpiphp: Slot [28] registered Aug 13 00:03:01.016803 kernel: acpiphp: Slot [29] registered Aug 13 00:03:01.016819 kernel: acpiphp: Slot [30] registered Aug 13 00:03:01.016834 kernel: acpiphp: Slot [31] registered Aug 13 00:03:01.016850 kernel: PCI host bridge to bus 0000:00 Aug 13 00:03:01.017048 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Aug 13 00:03:01.017260 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Aug 13 00:03:01.017441 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Aug 13 00:03:01.017608 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Aug 13 00:03:01.017818 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Aug 13 00:03:01.018044 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Aug 13 00:03:01.018266 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Aug 13 00:03:01.018470 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Aug 13 00:03:01.018670 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Aug 13 00:03:01.018862 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Aug 13 00:03:01.019065 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Aug 13 00:03:01.019287 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Aug 13 00:03:01.019480 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Aug 13 00:03:01.019664 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Aug 13 00:03:01.019852 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Aug 13 00:03:01.020046 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Aug 13 00:03:01.020262 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Aug 13 00:03:01.020453 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Aug 13 00:03:01.020641 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Aug 13 00:03:01.020830 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Aug 13 00:03:01.020999 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Aug 13 00:03:01.021208 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Aug 13 00:03:01.021383 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Aug 13 00:03:01.021407 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Aug 13 00:03:01.021424 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Aug 13 00:03:01.021441 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Aug 13 00:03:01.021457 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Aug 13 00:03:01.021474 kernel: iommu: Default domain type: Translated Aug 13 00:03:01.021490 kernel: iommu: DMA domain TLB invalidation policy: strict mode Aug 13 00:03:01.021507 kernel: vgaarb: loaded Aug 13 00:03:01.021523 kernel: pps_core: LinuxPPS API ver. 1 registered Aug 13 00:03:01.021545 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Aug 13 00:03:01.021562 kernel: PTP clock support registered Aug 13 00:03:01.021578 kernel: Registered efivars operations Aug 13 00:03:01.021594 kernel: clocksource: Switched to clocksource arch_sys_counter Aug 13 00:03:01.021610 kernel: VFS: Disk quotas dquot_6.6.0 Aug 13 00:03:01.035203 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Aug 13 00:03:01.035244 kernel: pnp: PnP ACPI init Aug 13 00:03:01.035473 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Aug 13 00:03:01.035508 kernel: pnp: PnP ACPI: found 1 devices Aug 13 00:03:01.035526 kernel: NET: Registered PF_INET protocol family Aug 13 00:03:01.035543 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Aug 13 00:03:01.035560 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Aug 13 00:03:01.035577 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Aug 13 00:03:01.035594 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Aug 13 00:03:01.035611 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Aug 13 00:03:01.035627 kernel: TCP: Hash tables configured (established 32768 bind 32768) Aug 13 00:03:01.035644 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Aug 13 00:03:01.035664 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Aug 13 00:03:01.035681 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Aug 13 00:03:01.035697 kernel: PCI: CLS 0 bytes, default 64 Aug 13 00:03:01.035713 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Aug 13 00:03:01.035729 kernel: kvm [1]: HYP mode not available Aug 13 00:03:01.035746 kernel: Initialise system trusted keyrings Aug 13 00:03:01.035763 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Aug 13 00:03:01.035779 kernel: Key type asymmetric registered Aug 13 00:03:01.035795 kernel: Asymmetric key parser 'x509' registered Aug 13 00:03:01.035815 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Aug 13 00:03:01.035831 kernel: io scheduler mq-deadline registered Aug 13 00:03:01.035848 kernel: io scheduler kyber registered Aug 13 00:03:01.035864 kernel: io scheduler bfq registered Aug 13 00:03:01.036069 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Aug 13 00:03:01.036094 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Aug 13 00:03:01.036111 kernel: ACPI: button: Power Button [PWRB] Aug 13 00:03:01.038181 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Aug 13 00:03:01.038200 kernel: ACPI: button: Sleep Button [SLPB] Aug 13 00:03:01.038224 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Aug 13 00:03:01.038241 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Aug 13 00:03:01.038451 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Aug 13 00:03:01.038476 kernel: printk: console [ttyS0] disabled Aug 13 00:03:01.038494 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Aug 13 00:03:01.038511 kernel: printk: console [ttyS0] enabled Aug 13 00:03:01.038527 kernel: printk: bootconsole [uart0] disabled Aug 13 00:03:01.038544 kernel: thunder_xcv, ver 1.0 Aug 13 00:03:01.038560 kernel: thunder_bgx, ver 1.0 Aug 13 00:03:01.038582 kernel: nicpf, ver 1.0 Aug 13 00:03:01.038598 kernel: nicvf, ver 1.0 Aug 13 00:03:01.038804 kernel: rtc-efi rtc-efi.0: registered as rtc0 Aug 13 00:03:01.039004 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-08-13T00:03:00 UTC (1755043380) Aug 13 00:03:01.039029 kernel: hid: raw HID events driver (C) Jiri Kosina Aug 13 00:03:01.039047 kernel: NET: Registered PF_INET6 protocol family Aug 13 00:03:01.039064 kernel: Segment Routing with IPv6 Aug 13 00:03:01.039080 kernel: In-situ OAM (IOAM) with IPv6 Aug 13 00:03:01.039102 kernel: NET: Registered PF_PACKET protocol family Aug 13 00:03:01.039148 kernel: Key type dns_resolver registered Aug 13 00:03:01.039169 kernel: registered taskstats version 1 Aug 13 00:03:01.039186 kernel: Loading compiled-in X.509 certificates Aug 13 00:03:01.039203 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.189-flatcar: 72b807ae6dac6ab18c2f4ab9460d3472cf28c19d' Aug 13 00:03:01.039219 kernel: Key type .fscrypt registered Aug 13 00:03:01.039249 kernel: Key type fscrypt-provisioning registered Aug 13 00:03:01.039266 kernel: ima: No TPM chip found, activating TPM-bypass! Aug 13 00:03:01.039282 kernel: ima: Allocated hash algorithm: sha1 Aug 13 00:03:01.039305 kernel: ima: No architecture policies found Aug 13 00:03:01.039322 kernel: clk: Disabling unused clocks Aug 13 00:03:01.039348 kernel: Freeing unused kernel memory: 36416K Aug 13 00:03:01.039368 kernel: Run /init as init process Aug 13 00:03:01.039384 kernel: with arguments: Aug 13 00:03:01.039400 kernel: /init Aug 13 00:03:01.039416 kernel: with environment: Aug 13 00:03:01.039432 kernel: HOME=/ Aug 13 00:03:01.039461 kernel: TERM=linux Aug 13 00:03:01.039484 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Aug 13 00:03:01.039506 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 00:03:01.039527 systemd[1]: Detected virtualization amazon. Aug 13 00:03:01.039559 systemd[1]: Detected architecture arm64. Aug 13 00:03:01.039578 systemd[1]: Running in initrd. Aug 13 00:03:01.039596 systemd[1]: No hostname configured, using default hostname. Aug 13 00:03:01.039613 systemd[1]: Hostname set to . Aug 13 00:03:01.039648 systemd[1]: Initializing machine ID from VM UUID. Aug 13 00:03:01.039667 systemd[1]: Queued start job for default target initrd.target. Aug 13 00:03:01.039685 systemd[1]: Started systemd-ask-password-console.path. Aug 13 00:03:01.039703 systemd[1]: Reached target cryptsetup.target. Aug 13 00:03:01.039720 systemd[1]: Reached target paths.target. Aug 13 00:03:01.039737 systemd[1]: Reached target slices.target. Aug 13 00:03:01.039754 systemd[1]: Reached target swap.target. Aug 13 00:03:01.039771 systemd[1]: Reached target timers.target. Aug 13 00:03:01.039803 systemd[1]: Listening on iscsid.socket. Aug 13 00:03:01.039825 systemd[1]: Listening on iscsiuio.socket. Aug 13 00:03:01.039842 systemd[1]: Listening on systemd-journald-audit.socket. Aug 13 00:03:01.039860 systemd[1]: Listening on systemd-journald-dev-log.socket. Aug 13 00:03:01.039877 systemd[1]: Listening on systemd-journald.socket. Aug 13 00:03:01.039895 systemd[1]: Listening on systemd-networkd.socket. Aug 13 00:03:01.039913 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 00:03:01.039930 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 00:03:01.039952 systemd[1]: Reached target sockets.target. Aug 13 00:03:01.039970 systemd[1]: Starting kmod-static-nodes.service... Aug 13 00:03:01.040001 systemd[1]: Finished network-cleanup.service. Aug 13 00:03:01.040020 systemd[1]: Starting systemd-fsck-usr.service... Aug 13 00:03:01.040038 systemd[1]: Starting systemd-journald.service... Aug 13 00:03:01.040056 systemd[1]: Starting systemd-modules-load.service... Aug 13 00:03:01.040073 systemd[1]: Starting systemd-resolved.service... Aug 13 00:03:01.040091 systemd[1]: Starting systemd-vconsole-setup.service... Aug 13 00:03:01.040109 systemd[1]: Finished kmod-static-nodes.service. Aug 13 00:03:01.042206 kernel: audit: type=1130 audit(1755043380.994:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.042232 systemd[1]: Finished systemd-fsck-usr.service. Aug 13 00:03:01.042251 kernel: audit: type=1130 audit(1755043381.020:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.042270 systemd[1]: Finished systemd-vconsole-setup.service. Aug 13 00:03:01.042292 systemd-journald[310]: Journal started Aug 13 00:03:01.042401 systemd-journald[310]: Runtime Journal (/run/log/journal/ec239a994922fd8b5692073081c84b6e) is 8.0M, max 75.4M, 67.4M free. Aug 13 00:03:00.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:00.995342 systemd-modules-load[311]: Inserted module 'overlay' Aug 13 00:03:01.064054 kernel: audit: type=1130 audit(1755043381.049:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.064100 systemd[1]: Started systemd-journald.service. Aug 13 00:03:01.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.077150 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Aug 13 00:03:01.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.092809 systemd-modules-load[311]: Inserted module 'br_netfilter' Aug 13 00:03:01.098092 kernel: audit: type=1130 audit(1755043381.080:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.098148 kernel: Bridge firewalling registered Aug 13 00:03:01.101458 systemd[1]: Starting dracut-cmdline-ask.service... Aug 13 00:03:01.108295 systemd-resolved[312]: Positive Trust Anchors: Aug 13 00:03:01.108309 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 00:03:01.108367 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 00:03:01.141522 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Aug 13 00:03:01.163682 systemd[1]: Finished dracut-cmdline-ask.service. Aug 13 00:03:01.174109 kernel: SCSI subsystem initialized Aug 13 00:03:01.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.174427 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Aug 13 00:03:01.189010 kernel: audit: type=1130 audit(1755043381.173:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.209597 kernel: audit: type=1130 audit(1755043381.192:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.209648 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Aug 13 00:03:01.209674 kernel: device-mapper: uevent: version 1.0.3 Aug 13 00:03:01.216153 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Aug 13 00:03:01.210156 systemd[1]: Starting dracut-cmdline.service... Aug 13 00:03:01.230219 systemd-modules-load[311]: Inserted module 'dm_multipath' Aug 13 00:03:01.235673 systemd[1]: Finished systemd-modules-load.service. Aug 13 00:03:01.252964 kernel: audit: type=1130 audit(1755043381.241:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.253065 dracut-cmdline[327]: dracut-dracut-053 Aug 13 00:03:01.243770 systemd[1]: Starting systemd-sysctl.service... Aug 13 00:03:01.267751 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=32404c0887e5b8a80b0f069916a8040bfd969c7a8f47a2db1168b24bc04220cc Aug 13 00:03:01.281615 systemd[1]: Finished systemd-sysctl.service. Aug 13 00:03:01.293025 kernel: audit: type=1130 audit(1755043381.282:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.397161 kernel: Loading iSCSI transport class v2.0-870. Aug 13 00:03:01.419262 kernel: iscsi: registered transport (tcp) Aug 13 00:03:01.446724 kernel: iscsi: registered transport (qla4xxx) Aug 13 00:03:01.446795 kernel: QLogic iSCSI HBA Driver Aug 13 00:03:01.629929 systemd-resolved[312]: Defaulting to hostname 'linux'. Aug 13 00:03:01.632680 kernel: random: crng init done Aug 13 00:03:01.633590 systemd[1]: Started systemd-resolved.service. Aug 13 00:03:01.646492 kernel: audit: type=1130 audit(1755043381.634:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.635548 systemd[1]: Reached target nss-lookup.target. Aug 13 00:03:01.665225 systemd[1]: Finished dracut-cmdline.service. Aug 13 00:03:01.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:01.666945 systemd[1]: Starting dracut-pre-udev.service... Aug 13 00:03:01.734164 kernel: raid6: neonx8 gen() 6411 MB/s Aug 13 00:03:01.752149 kernel: raid6: neonx8 xor() 4602 MB/s Aug 13 00:03:01.770153 kernel: raid6: neonx4 gen() 6584 MB/s Aug 13 00:03:01.788154 kernel: raid6: neonx4 xor() 4780 MB/s Aug 13 00:03:01.806153 kernel: raid6: neonx2 gen() 5818 MB/s Aug 13 00:03:01.824153 kernel: raid6: neonx2 xor() 4403 MB/s Aug 13 00:03:01.842155 kernel: raid6: neonx1 gen() 4504 MB/s Aug 13 00:03:01.860162 kernel: raid6: neonx1 xor() 3584 MB/s Aug 13 00:03:01.878161 kernel: raid6: int64x8 gen() 3437 MB/s Aug 13 00:03:01.896159 kernel: raid6: int64x8 xor() 2055 MB/s Aug 13 00:03:01.914161 kernel: raid6: int64x4 gen() 3856 MB/s Aug 13 00:03:01.932163 kernel: raid6: int64x4 xor() 2160 MB/s Aug 13 00:03:01.950159 kernel: raid6: int64x2 gen() 3612 MB/s Aug 13 00:03:01.968164 kernel: raid6: int64x2 xor() 1922 MB/s Aug 13 00:03:01.986160 kernel: raid6: int64x1 gen() 2755 MB/s Aug 13 00:03:02.005772 kernel: raid6: int64x1 xor() 1431 MB/s Aug 13 00:03:02.005807 kernel: raid6: using algorithm neonx4 gen() 6584 MB/s Aug 13 00:03:02.005839 kernel: raid6: .... xor() 4780 MB/s, rmw enabled Aug 13 00:03:02.007675 kernel: raid6: using neon recovery algorithm Aug 13 00:03:02.028536 kernel: xor: measuring software checksum speed Aug 13 00:03:02.028603 kernel: 8regs : 9294 MB/sec Aug 13 00:03:02.030479 kernel: 32regs : 11089 MB/sec Aug 13 00:03:02.032640 kernel: arm64_neon : 9559 MB/sec Aug 13 00:03:02.032679 kernel: xor: using function: 32regs (11089 MB/sec) Aug 13 00:03:02.134184 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Aug 13 00:03:02.151156 systemd[1]: Finished dracut-pre-udev.service. Aug 13 00:03:02.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:02.154000 audit: BPF prog-id=7 op=LOAD Aug 13 00:03:02.154000 audit: BPF prog-id=8 op=LOAD Aug 13 00:03:02.156013 systemd[1]: Starting systemd-udevd.service... Aug 13 00:03:02.190265 systemd-udevd[509]: Using default interface naming scheme 'v252'. Aug 13 00:03:02.201329 systemd[1]: Started systemd-udevd.service. Aug 13 00:03:02.208071 systemd[1]: Starting dracut-pre-trigger.service... Aug 13 00:03:02.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:02.237751 dracut-pre-trigger[515]: rd.md=0: removing MD RAID activation Aug 13 00:03:02.300345 systemd[1]: Finished dracut-pre-trigger.service. Aug 13 00:03:02.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:02.304006 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 00:03:02.402623 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 00:03:02.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:02.521019 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Aug 13 00:03:02.521093 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Aug 13 00:03:02.551167 kernel: ena 0000:00:05.0: ENA device version: 0.10 Aug 13 00:03:02.551445 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Aug 13 00:03:02.551472 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Aug 13 00:03:02.551674 kernel: nvme nvme0: pci function 0000:00:04.0 Aug 13 00:03:02.551899 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:14:18:1a:61:cd Aug 13 00:03:02.552093 kernel: nvme nvme0: 2/0/0 default/read/poll queues Aug 13 00:03:02.560758 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Aug 13 00:03:02.560827 kernel: GPT:9289727 != 16777215 Aug 13 00:03:02.563179 kernel: GPT:Alternate GPT header not at the end of the disk. Aug 13 00:03:02.564504 kernel: GPT:9289727 != 16777215 Aug 13 00:03:02.566454 kernel: GPT: Use GNU Parted to correct GPT errors. Aug 13 00:03:02.568046 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:03:02.571487 (udev-worker)[566]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:03:02.650153 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (570) Aug 13 00:03:02.725497 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Aug 13 00:03:02.751790 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Aug 13 00:03:02.770887 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 00:03:02.783144 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Aug 13 00:03:02.787290 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Aug 13 00:03:02.802056 systemd[1]: Starting disk-uuid.service... Aug 13 00:03:02.814402 disk-uuid[668]: Primary Header is updated. Aug 13 00:03:02.814402 disk-uuid[668]: Secondary Entries is updated. Aug 13 00:03:02.814402 disk-uuid[668]: Secondary Header is updated. Aug 13 00:03:02.822165 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:03:02.830163 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:03:02.840188 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:03:03.843158 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Aug 13 00:03:03.845930 disk-uuid[669]: The operation has completed successfully. Aug 13 00:03:04.001948 systemd[1]: disk-uuid.service: Deactivated successfully. Aug 13 00:03:04.002535 systemd[1]: Finished disk-uuid.service. Aug 13 00:03:04.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.027584 systemd[1]: Starting verity-setup.service... Aug 13 00:03:04.066164 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Aug 13 00:03:04.161655 systemd[1]: Found device dev-mapper-usr.device. Aug 13 00:03:04.166636 systemd[1]: Mounting sysusr-usr.mount... Aug 13 00:03:04.174715 systemd[1]: Finished verity-setup.service. Aug 13 00:03:04.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.263168 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Aug 13 00:03:04.264569 systemd[1]: Mounted sysusr-usr.mount. Aug 13 00:03:04.269957 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Aug 13 00:03:04.274210 systemd[1]: Starting ignition-setup.service... Aug 13 00:03:04.280995 systemd[1]: Starting parse-ip-for-networkd.service... Aug 13 00:03:04.310672 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Aug 13 00:03:04.310743 kernel: BTRFS info (device nvme0n1p6): using free space tree Aug 13 00:03:04.313036 kernel: BTRFS info (device nvme0n1p6): has skinny extents Aug 13 00:03:04.327254 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Aug 13 00:03:04.348307 systemd[1]: mnt-oem.mount: Deactivated successfully. Aug 13 00:03:04.368633 systemd[1]: Finished ignition-setup.service. Aug 13 00:03:04.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.373325 systemd[1]: Starting ignition-fetch-offline.service... Aug 13 00:03:04.430913 systemd[1]: Finished parse-ip-for-networkd.service. Aug 13 00:03:04.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.436000 audit: BPF prog-id=9 op=LOAD Aug 13 00:03:04.439420 systemd[1]: Starting systemd-networkd.service... Aug 13 00:03:04.487906 systemd-networkd[1181]: lo: Link UP Aug 13 00:03:04.487932 systemd-networkd[1181]: lo: Gained carrier Aug 13 00:03:04.491993 systemd-networkd[1181]: Enumeration completed Aug 13 00:03:04.492629 systemd-networkd[1181]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 00:03:04.493460 systemd[1]: Started systemd-networkd.service. Aug 13 00:03:04.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.500895 systemd[1]: Reached target network.target. Aug 13 00:03:04.507112 systemd[1]: Starting iscsiuio.service... Aug 13 00:03:04.517358 systemd-networkd[1181]: eth0: Link UP Aug 13 00:03:04.517372 systemd-networkd[1181]: eth0: Gained carrier Aug 13 00:03:04.526287 systemd[1]: Started iscsiuio.service. Aug 13 00:03:04.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.530739 systemd[1]: Starting iscsid.service... Aug 13 00:03:04.533484 systemd-networkd[1181]: eth0: DHCPv4 address 172.31.18.161/20, gateway 172.31.16.1 acquired from 172.31.16.1 Aug 13 00:03:04.543567 iscsid[1186]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Aug 13 00:03:04.543567 iscsid[1186]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Aug 13 00:03:04.543567 iscsid[1186]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Aug 13 00:03:04.543567 iscsid[1186]: If using hardware iscsi like qla4xxx this message can be ignored. Aug 13 00:03:04.543567 iscsid[1186]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Aug 13 00:03:04.565387 iscsid[1186]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Aug 13 00:03:04.575383 systemd[1]: Started iscsid.service. Aug 13 00:03:04.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.584342 systemd[1]: Starting dracut-initqueue.service... Aug 13 00:03:04.607803 systemd[1]: Finished dracut-initqueue.service. Aug 13 00:03:04.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.614781 systemd[1]: Reached target remote-fs-pre.target. Aug 13 00:03:04.620096 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 00:03:04.622056 systemd[1]: Reached target remote-fs.target. Aug 13 00:03:04.630395 systemd[1]: Starting dracut-pre-mount.service... Aug 13 00:03:04.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:04.652414 systemd[1]: Finished dracut-pre-mount.service. Aug 13 00:03:05.190193 ignition[1135]: Ignition 2.14.0 Aug 13 00:03:05.190223 ignition[1135]: Stage: fetch-offline Aug 13 00:03:05.190834 ignition[1135]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:03:05.190901 ignition[1135]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:03:05.219936 ignition[1135]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:03:05.222692 ignition[1135]: Ignition finished successfully Aug 13 00:03:05.226156 systemd[1]: Finished ignition-fetch-offline.service. Aug 13 00:03:05.243941 kernel: kauditd_printk_skb: 18 callbacks suppressed Aug 13 00:03:05.245426 kernel: audit: type=1130 audit(1755043385.227:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.229954 systemd[1]: Starting ignition-fetch.service... Aug 13 00:03:05.255200 ignition[1205]: Ignition 2.14.0 Aug 13 00:03:05.255229 ignition[1205]: Stage: fetch Aug 13 00:03:05.255528 ignition[1205]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:03:05.255585 ignition[1205]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:03:05.273206 ignition[1205]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:03:05.275865 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:03:05.286356 ignition[1205]: INFO : PUT result: OK Aug 13 00:03:05.291714 ignition[1205]: DEBUG : parsed url from cmdline: "" Aug 13 00:03:05.293651 ignition[1205]: INFO : no config URL provided Aug 13 00:03:05.295385 ignition[1205]: INFO : reading system config file "/usr/lib/ignition/user.ign" Aug 13 00:03:05.295385 ignition[1205]: INFO : no config at "/usr/lib/ignition/user.ign" Aug 13 00:03:05.295385 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:03:05.302790 ignition[1205]: INFO : PUT result: OK Aug 13 00:03:05.302790 ignition[1205]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Aug 13 00:03:05.307247 ignition[1205]: INFO : GET result: OK Aug 13 00:03:05.308857 ignition[1205]: DEBUG : parsing config with SHA512: 934596d42a2cc489446002a3b449ed2fd784b12f2fe2098e037123d3a9df8563a997bc90c0e708db5f3fe2e4eac6cca4df90a10dc3a9212b1201d6fe62785dc9 Aug 13 00:03:05.314199 unknown[1205]: fetched base config from "system" Aug 13 00:03:05.314631 unknown[1205]: fetched base config from "system" Aug 13 00:03:05.316158 unknown[1205]: fetched user config from "aws" Aug 13 00:03:05.320543 ignition[1205]: fetch: fetch complete Aug 13 00:03:05.320613 ignition[1205]: fetch: fetch passed Aug 13 00:03:05.322106 ignition[1205]: Ignition finished successfully Aug 13 00:03:05.327465 systemd[1]: Finished ignition-fetch.service. Aug 13 00:03:05.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.332114 systemd[1]: Starting ignition-kargs.service... Aug 13 00:03:05.343085 kernel: audit: type=1130 audit(1755043385.329:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.355926 ignition[1211]: Ignition 2.14.0 Aug 13 00:03:05.355953 ignition[1211]: Stage: kargs Aug 13 00:03:05.356277 ignition[1211]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:03:05.356342 ignition[1211]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:03:05.371858 ignition[1211]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:03:05.374353 ignition[1211]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:03:05.377923 ignition[1211]: INFO : PUT result: OK Aug 13 00:03:05.382313 ignition[1211]: kargs: kargs passed Aug 13 00:03:05.401985 kernel: audit: type=1130 audit(1755043385.384:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.384157 systemd[1]: Finished ignition-kargs.service. Aug 13 00:03:05.382416 ignition[1211]: Ignition finished successfully Aug 13 00:03:05.387465 systemd[1]: Starting ignition-disks.service... Aug 13 00:03:05.406554 ignition[1217]: Ignition 2.14.0 Aug 13 00:03:05.406569 ignition[1217]: Stage: disks Aug 13 00:03:05.406861 ignition[1217]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:03:05.434114 ignition[1217]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:03:05.434114 ignition[1217]: INFO : PUT result: OK Aug 13 00:03:05.406913 ignition[1217]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:03:05.424936 ignition[1217]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:03:05.442863 ignition[1217]: disks: disks passed Aug 13 00:03:05.442972 ignition[1217]: Ignition finished successfully Aug 13 00:03:05.447458 systemd[1]: Finished ignition-disks.service. Aug 13 00:03:05.450961 systemd[1]: Reached target initrd-root-device.target. Aug 13 00:03:05.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.462027 systemd[1]: Reached target local-fs-pre.target. Aug 13 00:03:05.463941 systemd[1]: Reached target local-fs.target. Aug 13 00:03:05.467274 kernel: audit: type=1130 audit(1755043385.449:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.467191 systemd[1]: Reached target sysinit.target. Aug 13 00:03:05.470295 systemd[1]: Reached target basic.target. Aug 13 00:03:05.476248 systemd[1]: Starting systemd-fsck-root.service... Aug 13 00:03:05.516153 systemd-fsck[1225]: ROOT: clean, 629/553520 files, 56026/553472 blocks Aug 13 00:03:05.526065 systemd[1]: Finished systemd-fsck-root.service. Aug 13 00:03:05.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.531303 systemd[1]: Mounting sysroot.mount... Aug 13 00:03:05.540741 kernel: audit: type=1130 audit(1755043385.528:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.554166 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Aug 13 00:03:05.556044 systemd[1]: Mounted sysroot.mount. Aug 13 00:03:05.556376 systemd[1]: Reached target initrd-root-fs.target. Aug 13 00:03:05.564105 systemd[1]: Mounting sysroot-usr.mount... Aug 13 00:03:05.569638 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Aug 13 00:03:05.569737 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Aug 13 00:03:05.570035 systemd[1]: Reached target ignition-diskful.target. Aug 13 00:03:05.579853 systemd[1]: Mounted sysroot-usr.mount. Aug 13 00:03:05.606533 systemd[1]: Mounting sysroot-usr-share-oem.mount... Aug 13 00:03:05.611720 systemd[1]: Starting initrd-setup-root.service... Aug 13 00:03:05.623654 initrd-setup-root[1247]: cut: /sysroot/etc/passwd: No such file or directory Aug 13 00:03:05.644169 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1242) Aug 13 00:03:05.648084 initrd-setup-root[1255]: cut: /sysroot/etc/group: No such file or directory Aug 13 00:03:05.656162 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Aug 13 00:03:05.656202 kernel: BTRFS info (device nvme0n1p6): using free space tree Aug 13 00:03:05.656226 kernel: BTRFS info (device nvme0n1p6): has skinny extents Aug 13 00:03:05.657840 initrd-setup-root[1266]: cut: /sysroot/etc/shadow: No such file or directory Aug 13 00:03:05.668409 initrd-setup-root[1287]: cut: /sysroot/etc/gshadow: No such file or directory Aug 13 00:03:05.675179 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Aug 13 00:03:05.680175 systemd[1]: Mounted sysroot-usr-share-oem.mount. Aug 13 00:03:05.886807 systemd[1]: Finished initrd-setup-root.service. Aug 13 00:03:05.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.891667 systemd[1]: Starting ignition-mount.service... Aug 13 00:03:05.906162 kernel: audit: type=1130 audit(1755043385.889:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.902583 systemd[1]: Starting sysroot-boot.service... Aug 13 00:03:05.916035 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Aug 13 00:03:05.916733 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Aug 13 00:03:05.942959 ignition[1307]: INFO : Ignition 2.14.0 Aug 13 00:03:05.942959 ignition[1307]: INFO : Stage: mount Aug 13 00:03:05.949111 ignition[1307]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:03:05.949111 ignition[1307]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:03:05.962007 systemd[1]: Finished sysroot-boot.service. Aug 13 00:03:05.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.974208 kernel: audit: type=1130 audit(1755043385.964:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:05.974517 ignition[1307]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:03:05.977414 ignition[1307]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:03:05.981767 ignition[1307]: INFO : PUT result: OK Aug 13 00:03:05.986611 ignition[1307]: INFO : mount: mount passed Aug 13 00:03:05.989100 ignition[1307]: INFO : Ignition finished successfully Aug 13 00:03:05.988772 systemd[1]: Finished ignition-mount.service. Aug 13 00:03:05.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:06.003504 systemd[1]: Starting ignition-files.service... Aug 13 00:03:06.009172 kernel: audit: type=1130 audit(1755043385.993:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:06.020889 systemd[1]: Mounting sysroot-usr-share-oem.mount... Aug 13 00:03:06.046175 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1318) Aug 13 00:03:06.051995 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Aug 13 00:03:06.052032 kernel: BTRFS info (device nvme0n1p6): using free space tree Aug 13 00:03:06.052056 kernel: BTRFS info (device nvme0n1p6): has skinny extents Aug 13 00:03:06.062160 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Aug 13 00:03:06.067153 systemd[1]: Mounted sysroot-usr-share-oem.mount. Aug 13 00:03:06.087027 ignition[1337]: INFO : Ignition 2.14.0 Aug 13 00:03:06.087027 ignition[1337]: INFO : Stage: files Aug 13 00:03:06.090716 ignition[1337]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:03:06.090716 ignition[1337]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:03:06.108821 ignition[1337]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:03:06.111589 ignition[1337]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:03:06.114329 ignition[1337]: INFO : PUT result: OK Aug 13 00:03:06.119372 ignition[1337]: DEBUG : files: compiled without relabeling support, skipping Aug 13 00:03:06.123364 ignition[1337]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Aug 13 00:03:06.123364 ignition[1337]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Aug 13 00:03:06.182316 ignition[1337]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Aug 13 00:03:06.185472 ignition[1337]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Aug 13 00:03:06.189791 unknown[1337]: wrote ssh authorized keys file for user: core Aug 13 00:03:06.192217 ignition[1337]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Aug 13 00:03:06.196026 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Aug 13 00:03:06.199856 ignition[1337]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:03:06.211951 ignition[1337]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3628949555" Aug 13 00:03:06.216448 ignition[1337]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3628949555": device or resource busy Aug 13 00:03:06.222109 ignition[1337]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3628949555", trying btrfs: device or resource busy Aug 13 00:03:06.222109 ignition[1337]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3628949555" Aug 13 00:03:06.222109 ignition[1337]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3628949555" Aug 13 00:03:06.237225 ignition[1337]: INFO : op(3): [started] unmounting "/mnt/oem3628949555" Aug 13 00:03:06.237225 ignition[1337]: INFO : op(3): [finished] unmounting "/mnt/oem3628949555" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Aug 13 00:03:06.237225 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Aug 13 00:03:06.237225 ignition[1337]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:03:06.284076 ignition[1337]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1291103888" Aug 13 00:03:06.284076 ignition[1337]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1291103888": device or resource busy Aug 13 00:03:06.284076 ignition[1337]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1291103888", trying btrfs: device or resource busy Aug 13 00:03:06.284076 ignition[1337]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1291103888" Aug 13 00:03:06.284076 ignition[1337]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1291103888" Aug 13 00:03:06.284076 ignition[1337]: INFO : op(6): [started] unmounting "/mnt/oem1291103888" Aug 13 00:03:06.284076 ignition[1337]: INFO : op(6): [finished] unmounting "/mnt/oem1291103888" Aug 13 00:03:06.284076 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Aug 13 00:03:06.284076 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Aug 13 00:03:06.284076 ignition[1337]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:03:06.320734 ignition[1337]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2553426829" Aug 13 00:03:06.320734 ignition[1337]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2553426829": device or resource busy Aug 13 00:03:06.320734 ignition[1337]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2553426829", trying btrfs: device or resource busy Aug 13 00:03:06.320734 ignition[1337]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2553426829" Aug 13 00:03:06.320734 ignition[1337]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2553426829" Aug 13 00:03:06.320734 ignition[1337]: INFO : op(9): [started] unmounting "/mnt/oem2553426829" Aug 13 00:03:06.320734 ignition[1337]: INFO : op(9): [finished] unmounting "/mnt/oem2553426829" Aug 13 00:03:06.320734 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Aug 13 00:03:06.347954 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Aug 13 00:03:06.347954 ignition[1337]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:03:06.331653 systemd-networkd[1181]: eth0: Gained IPv6LL Aug 13 00:03:06.367196 ignition[1337]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1204780074" Aug 13 00:03:06.367196 ignition[1337]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1204780074": device or resource busy Aug 13 00:03:06.367196 ignition[1337]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1204780074", trying btrfs: device or resource busy Aug 13 00:03:06.367196 ignition[1337]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1204780074" Aug 13 00:03:06.367196 ignition[1337]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1204780074" Aug 13 00:03:06.383816 ignition[1337]: INFO : op(c): [started] unmounting "/mnt/oem1204780074" Aug 13 00:03:06.383816 ignition[1337]: INFO : op(c): [finished] unmounting "/mnt/oem1204780074" Aug 13 00:03:06.383816 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Aug 13 00:03:06.383816 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Aug 13 00:03:06.383816 ignition[1337]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 Aug 13 00:03:06.704939 ignition[1337]: INFO : GET result: OK Aug 13 00:03:07.278186 ignition[1337]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Aug 13 00:03:07.278186 ignition[1337]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(e): [started] processing unit "nvidia.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(e): [finished] processing unit "nvidia.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Aug 13 00:03:07.286223 ignition[1337]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Aug 13 00:03:07.330570 ignition[1337]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Aug 13 00:03:07.334345 ignition[1337]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Aug 13 00:03:07.334345 ignition[1337]: INFO : files: files passed Aug 13 00:03:07.334345 ignition[1337]: INFO : Ignition finished successfully Aug 13 00:03:07.344292 systemd[1]: Finished ignition-files.service. Aug 13 00:03:07.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.356153 kernel: audit: type=1130 audit(1755043387.345:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.365046 systemd[1]: Starting initrd-setup-root-after-ignition.service... Aug 13 00:03:07.367307 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Aug 13 00:03:07.375362 systemd[1]: Starting ignition-quench.service... Aug 13 00:03:07.384395 systemd[1]: ignition-quench.service: Deactivated successfully. Aug 13 00:03:07.386702 systemd[1]: Finished ignition-quench.service. Aug 13 00:03:07.390075 initrd-setup-root-after-ignition[1362]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Aug 13 00:03:07.394245 systemd[1]: Finished initrd-setup-root-after-ignition.service. Aug 13 00:03:07.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.406190 kernel: audit: type=1130 audit(1755043387.392:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.406359 systemd[1]: Reached target ignition-complete.target. Aug 13 00:03:07.411397 systemd[1]: Starting initrd-parse-etc.service... Aug 13 00:03:07.439746 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Aug 13 00:03:07.442180 systemd[1]: Finished initrd-parse-etc.service. Aug 13 00:03:07.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.446029 systemd[1]: Reached target initrd-fs.target. Aug 13 00:03:07.449323 systemd[1]: Reached target initrd.target. Aug 13 00:03:07.452484 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Aug 13 00:03:07.456681 systemd[1]: Starting dracut-pre-pivot.service... Aug 13 00:03:07.478303 systemd[1]: Finished dracut-pre-pivot.service. Aug 13 00:03:07.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.485573 systemd[1]: Starting initrd-cleanup.service... Aug 13 00:03:07.512388 systemd[1]: initrd-cleanup.service: Deactivated successfully. Aug 13 00:03:07.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.512610 systemd[1]: Finished initrd-cleanup.service. Aug 13 00:03:07.516036 systemd[1]: Stopped target nss-lookup.target. Aug 13 00:03:07.516097 systemd[1]: Stopped target remote-cryptsetup.target. Aug 13 00:03:07.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.516483 systemd[1]: Stopped target timers.target. Aug 13 00:03:07.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.599279 ignition[1375]: INFO : Ignition 2.14.0 Aug 13 00:03:07.599279 ignition[1375]: INFO : Stage: umount Aug 13 00:03:07.599279 ignition[1375]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:03:07.599279 ignition[1375]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Aug 13 00:03:07.516861 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Aug 13 00:03:07.516948 systemd[1]: Stopped dracut-pre-pivot.service. Aug 13 00:03:07.517616 systemd[1]: Stopped target initrd.target. Aug 13 00:03:07.517869 systemd[1]: Stopped target basic.target. Aug 13 00:03:07.518578 systemd[1]: Stopped target ignition-complete.target. Aug 13 00:03:07.518936 systemd[1]: Stopped target ignition-diskful.target. Aug 13 00:03:07.519624 systemd[1]: Stopped target initrd-root-device.target. Aug 13 00:03:07.519993 systemd[1]: Stopped target remote-fs.target. Aug 13 00:03:07.520681 systemd[1]: Stopped target remote-fs-pre.target. Aug 13 00:03:07.521052 systemd[1]: Stopped target sysinit.target. Aug 13 00:03:07.521407 systemd[1]: Stopped target local-fs.target. Aug 13 00:03:07.521747 systemd[1]: Stopped target local-fs-pre.target. Aug 13 00:03:07.524049 systemd[1]: Stopped target swap.target. Aug 13 00:03:07.527025 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Aug 13 00:03:07.528472 systemd[1]: Stopped dracut-pre-mount.service. Aug 13 00:03:07.531244 systemd[1]: Stopped target cryptsetup.target. Aug 13 00:03:07.646074 ignition[1375]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Aug 13 00:03:07.646074 ignition[1375]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Aug 13 00:03:07.531444 systemd[1]: dracut-initqueue.service: Deactivated successfully. Aug 13 00:03:07.531517 systemd[1]: Stopped dracut-initqueue.service. Aug 13 00:03:07.656041 ignition[1375]: INFO : PUT result: OK Aug 13 00:03:07.531910 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Aug 13 00:03:07.531984 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Aug 13 00:03:07.532223 systemd[1]: ignition-files.service: Deactivated successfully. Aug 13 00:03:07.668650 ignition[1375]: INFO : umount: umount passed Aug 13 00:03:07.668650 ignition[1375]: INFO : Ignition finished successfully Aug 13 00:03:07.532296 systemd[1]: Stopped ignition-files.service. Aug 13 00:03:07.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.533687 systemd[1]: Stopping ignition-mount.service... Aug 13 00:03:07.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.534557 systemd[1]: Stopping iscsiuio.service... Aug 13 00:03:07.534648 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Aug 13 00:03:07.534752 systemd[1]: Stopped kmod-static-nodes.service. Aug 13 00:03:07.562075 systemd[1]: Stopping sysroot-boot.service... Aug 13 00:03:07.587178 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Aug 13 00:03:07.587321 systemd[1]: Stopped systemd-udev-trigger.service. Aug 13 00:03:07.589498 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Aug 13 00:03:07.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.589592 systemd[1]: Stopped dracut-pre-trigger.service. Aug 13 00:03:07.594851 systemd[1]: iscsiuio.service: Deactivated successfully. Aug 13 00:03:07.595053 systemd[1]: Stopped iscsiuio.service. Aug 13 00:03:07.645994 systemd[1]: sysroot-boot.mount: Deactivated successfully. Aug 13 00:03:07.670884 systemd[1]: ignition-mount.service: Deactivated successfully. Aug 13 00:03:07.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.671068 systemd[1]: Stopped ignition-mount.service. Aug 13 00:03:07.675073 systemd[1]: ignition-disks.service: Deactivated successfully. Aug 13 00:03:07.675200 systemd[1]: Stopped ignition-disks.service. Aug 13 00:03:07.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.678717 systemd[1]: ignition-kargs.service: Deactivated successfully. Aug 13 00:03:07.678806 systemd[1]: Stopped ignition-kargs.service. Aug 13 00:03:07.755000 audit: BPF prog-id=6 op=UNLOAD Aug 13 00:03:07.682206 systemd[1]: ignition-fetch.service: Deactivated successfully. Aug 13 00:03:07.682288 systemd[1]: Stopped ignition-fetch.service. Aug 13 00:03:07.684179 systemd[1]: Stopped target network.target. Aug 13 00:03:07.685960 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Aug 13 00:03:07.686045 systemd[1]: Stopped ignition-fetch-offline.service. Aug 13 00:03:07.688041 systemd[1]: Stopped target paths.target. Aug 13 00:03:07.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.689649 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Aug 13 00:03:07.693225 systemd[1]: Stopped systemd-ask-password-console.path. Aug 13 00:03:07.700248 systemd[1]: Stopped target slices.target. Aug 13 00:03:07.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.701947 systemd[1]: Stopped target sockets.target. Aug 13 00:03:07.703785 systemd[1]: iscsid.socket: Deactivated successfully. Aug 13 00:03:07.703843 systemd[1]: Closed iscsid.socket. Aug 13 00:03:07.707909 systemd[1]: iscsiuio.socket: Deactivated successfully. Aug 13 00:03:07.707990 systemd[1]: Closed iscsiuio.socket. Aug 13 00:03:07.710794 systemd[1]: ignition-setup.service: Deactivated successfully. Aug 13 00:03:07.710884 systemd[1]: Stopped ignition-setup.service. Aug 13 00:03:07.714930 systemd[1]: Stopping systemd-networkd.service... Aug 13 00:03:07.716884 systemd[1]: Stopping systemd-resolved.service... Aug 13 00:03:07.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.721366 systemd-networkd[1181]: eth0: DHCPv6 lease lost Aug 13 00:03:07.828000 audit: BPF prog-id=9 op=UNLOAD Aug 13 00:03:07.728019 systemd[1]: systemd-networkd.service: Deactivated successfully. Aug 13 00:03:07.728400 systemd[1]: Stopped systemd-networkd.service. Aug 13 00:03:07.737401 systemd[1]: systemd-resolved.service: Deactivated successfully. Aug 13 00:03:07.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.737600 systemd[1]: Stopped systemd-resolved.service. Aug 13 00:03:07.756623 systemd[1]: systemd-networkd.socket: Deactivated successfully. Aug 13 00:03:07.756699 systemd[1]: Closed systemd-networkd.socket. Aug 13 00:03:07.767716 systemd[1]: Stopping network-cleanup.service... Aug 13 00:03:07.771510 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Aug 13 00:03:07.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.771630 systemd[1]: Stopped parse-ip-for-networkd.service. Aug 13 00:03:07.780198 systemd[1]: systemd-sysctl.service: Deactivated successfully. Aug 13 00:03:07.780289 systemd[1]: Stopped systemd-sysctl.service. Aug 13 00:03:07.787724 systemd[1]: systemd-modules-load.service: Deactivated successfully. Aug 13 00:03:07.789193 systemd[1]: Stopped systemd-modules-load.service. Aug 13 00:03:07.796541 systemd[1]: Stopping systemd-udevd.service... Aug 13 00:03:07.809477 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Aug 13 00:03:07.823896 systemd[1]: sysroot-boot.service: Deactivated successfully. Aug 13 00:03:07.824134 systemd[1]: Stopped sysroot-boot.service. Aug 13 00:03:07.831798 systemd[1]: network-cleanup.service: Deactivated successfully. Aug 13 00:03:07.831997 systemd[1]: Stopped network-cleanup.service. Aug 13 00:03:07.841656 systemd[1]: systemd-udevd.service: Deactivated successfully. Aug 13 00:03:07.842511 systemd[1]: Stopped systemd-udevd.service. Aug 13 00:03:07.858653 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Aug 13 00:03:07.858752 systemd[1]: Closed systemd-udevd-control.socket. Aug 13 00:03:07.883921 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Aug 13 00:03:07.884013 systemd[1]: Closed systemd-udevd-kernel.socket. Aug 13 00:03:07.887822 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Aug 13 00:03:07.891634 systemd[1]: Stopped dracut-pre-udev.service. Aug 13 00:03:07.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.894954 systemd[1]: dracut-cmdline.service: Deactivated successfully. Aug 13 00:03:07.895039 systemd[1]: Stopped dracut-cmdline.service. Aug 13 00:03:07.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.900144 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Aug 13 00:03:07.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.900228 systemd[1]: Stopped dracut-cmdline-ask.service. Aug 13 00:03:07.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.902174 systemd[1]: initrd-setup-root.service: Deactivated successfully. Aug 13 00:03:07.904306 systemd[1]: Stopped initrd-setup-root.service. Aug 13 00:03:07.912732 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Aug 13 00:03:07.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.918081 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Aug 13 00:03:07.918231 systemd[1]: Stopped systemd-vconsole-setup.service. Aug 13 00:03:07.933266 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Aug 13 00:03:07.935876 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Aug 13 00:03:07.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:07.940095 systemd[1]: Reached target initrd-switch-root.target. Aug 13 00:03:07.945159 systemd[1]: Starting initrd-switch-root.service... Aug 13 00:03:07.959767 systemd[1]: Switching root. Aug 13 00:03:07.991170 systemd-journald[310]: Received SIGTERM from PID 1 (n/a). Aug 13 00:03:07.991262 iscsid[1186]: iscsid shutting down. Aug 13 00:03:07.998293 systemd-journald[310]: Journal stopped Aug 13 00:03:14.434619 kernel: SELinux: Class mctp_socket not defined in policy. Aug 13 00:03:14.434740 kernel: SELinux: Class anon_inode not defined in policy. Aug 13 00:03:14.434776 kernel: SELinux: the above unknown classes and permissions will be allowed Aug 13 00:03:14.434809 kernel: SELinux: policy capability network_peer_controls=1 Aug 13 00:03:14.434843 kernel: SELinux: policy capability open_perms=1 Aug 13 00:03:14.434894 kernel: SELinux: policy capability extended_socket_class=1 Aug 13 00:03:14.434926 kernel: SELinux: policy capability always_check_network=0 Aug 13 00:03:14.434957 kernel: SELinux: policy capability cgroup_seclabel=1 Aug 13 00:03:14.434988 kernel: SELinux: policy capability nnp_nosuid_transition=1 Aug 13 00:03:14.435020 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Aug 13 00:03:14.435052 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Aug 13 00:03:14.435093 systemd[1]: Successfully loaded SELinux policy in 135.656ms. Aug 13 00:03:14.435423 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.363ms. Aug 13 00:03:14.435469 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 00:03:14.435511 systemd[1]: Detected virtualization amazon. Aug 13 00:03:14.435543 systemd[1]: Detected architecture arm64. Aug 13 00:03:14.435573 systemd[1]: Detected first boot. Aug 13 00:03:14.435607 systemd[1]: Initializing machine ID from VM UUID. Aug 13 00:03:14.435639 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Aug 13 00:03:14.435671 systemd[1]: Populated /etc with preset unit settings. Aug 13 00:03:14.435711 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:03:14.435750 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:03:14.443650 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:03:14.443693 kernel: kauditd_printk_skb: 55 callbacks suppressed Aug 13 00:03:14.443727 kernel: audit: type=1334 audit(1755043393.996:87): prog-id=12 op=LOAD Aug 13 00:03:14.443760 kernel: audit: type=1334 audit(1755043393.998:88): prog-id=3 op=UNLOAD Aug 13 00:03:14.443789 kernel: audit: type=1334 audit(1755043394.000:89): prog-id=13 op=LOAD Aug 13 00:03:14.443820 kernel: audit: type=1334 audit(1755043394.003:90): prog-id=14 op=LOAD Aug 13 00:03:14.443858 kernel: audit: type=1334 audit(1755043394.003:91): prog-id=4 op=UNLOAD Aug 13 00:03:14.443890 kernel: audit: type=1334 audit(1755043394.003:92): prog-id=5 op=UNLOAD Aug 13 00:03:14.443920 kernel: audit: type=1334 audit(1755043394.008:93): prog-id=15 op=LOAD Aug 13 00:03:14.443952 kernel: audit: type=1334 audit(1755043394.008:94): prog-id=12 op=UNLOAD Aug 13 00:03:14.443981 systemd[1]: iscsid.service: Deactivated successfully. Aug 13 00:03:14.444015 kernel: audit: type=1334 audit(1755043394.011:95): prog-id=16 op=LOAD Aug 13 00:03:14.444045 systemd[1]: Stopped iscsid.service. Aug 13 00:03:14.444079 kernel: audit: type=1334 audit(1755043394.013:96): prog-id=17 op=LOAD Aug 13 00:03:14.444111 systemd[1]: initrd-switch-root.service: Deactivated successfully. Aug 13 00:03:14.445287 systemd[1]: Stopped initrd-switch-root.service. Aug 13 00:03:14.445326 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Aug 13 00:03:14.445360 systemd[1]: Created slice system-addon\x2dconfig.slice. Aug 13 00:03:14.445395 systemd[1]: Created slice system-addon\x2drun.slice. Aug 13 00:03:14.445427 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Aug 13 00:03:14.445459 systemd[1]: Created slice system-getty.slice. Aug 13 00:03:14.445491 systemd[1]: Created slice system-modprobe.slice. Aug 13 00:03:14.445528 systemd[1]: Created slice system-serial\x2dgetty.slice. Aug 13 00:03:14.445559 systemd[1]: Created slice system-system\x2dcloudinit.slice. Aug 13 00:03:14.445589 systemd[1]: Created slice system-systemd\x2dfsck.slice. Aug 13 00:03:14.445620 systemd[1]: Created slice user.slice. Aug 13 00:03:14.445654 systemd[1]: Started systemd-ask-password-console.path. Aug 13 00:03:14.445684 systemd[1]: Started systemd-ask-password-wall.path. Aug 13 00:03:14.445716 systemd[1]: Set up automount boot.automount. Aug 13 00:03:14.445745 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Aug 13 00:03:14.445775 systemd[1]: Stopped target initrd-switch-root.target. Aug 13 00:03:14.445805 systemd[1]: Stopped target initrd-fs.target. Aug 13 00:03:14.445858 systemd[1]: Stopped target initrd-root-fs.target. Aug 13 00:03:14.445896 systemd[1]: Reached target integritysetup.target. Aug 13 00:03:14.445926 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 00:03:14.445959 systemd[1]: Reached target remote-fs.target. Aug 13 00:03:14.445990 systemd[1]: Reached target slices.target. Aug 13 00:03:14.446027 systemd[1]: Reached target swap.target. Aug 13 00:03:14.446059 systemd[1]: Reached target torcx.target. Aug 13 00:03:14.446092 systemd[1]: Reached target veritysetup.target. Aug 13 00:03:14.446170 systemd[1]: Listening on systemd-coredump.socket. Aug 13 00:03:14.446210 systemd[1]: Listening on systemd-initctl.socket. Aug 13 00:03:14.446242 systemd[1]: Listening on systemd-networkd.socket. Aug 13 00:03:14.446272 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 00:03:14.446305 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 00:03:14.446335 systemd[1]: Listening on systemd-userdbd.socket. Aug 13 00:03:14.446364 systemd[1]: Mounting dev-hugepages.mount... Aug 13 00:03:14.446396 systemd[1]: Mounting dev-mqueue.mount... Aug 13 00:03:14.446426 systemd[1]: Mounting media.mount... Aug 13 00:03:14.446456 systemd[1]: Mounting sys-kernel-debug.mount... Aug 13 00:03:14.446490 systemd[1]: Mounting sys-kernel-tracing.mount... Aug 13 00:03:14.446520 systemd[1]: Mounting tmp.mount... Aug 13 00:03:14.446559 systemd[1]: Starting flatcar-tmpfiles.service... Aug 13 00:03:14.446592 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:03:14.446621 systemd[1]: Starting kmod-static-nodes.service... Aug 13 00:03:14.446653 systemd[1]: Starting modprobe@configfs.service... Aug 13 00:03:14.446682 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:03:14.446716 systemd[1]: Starting modprobe@drm.service... Aug 13 00:03:14.446746 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:03:14.446780 systemd[1]: Starting modprobe@fuse.service... Aug 13 00:03:14.446810 systemd[1]: Starting modprobe@loop.service... Aug 13 00:03:14.446843 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Aug 13 00:03:14.446874 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Aug 13 00:03:14.446906 systemd[1]: Stopped systemd-fsck-root.service. Aug 13 00:03:14.446936 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Aug 13 00:03:14.446968 systemd[1]: Stopped systemd-fsck-usr.service. Aug 13 00:03:14.446998 systemd[1]: Stopped systemd-journald.service. Aug 13 00:03:14.447028 systemd[1]: Starting systemd-journald.service... Aug 13 00:03:14.447061 systemd[1]: Starting systemd-modules-load.service... Aug 13 00:03:14.447091 systemd[1]: Starting systemd-network-generator.service... Aug 13 00:03:14.447143 systemd[1]: Starting systemd-remount-fs.service... Aug 13 00:03:14.447177 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 00:03:14.447214 systemd[1]: verity-setup.service: Deactivated successfully. Aug 13 00:03:14.447244 systemd[1]: Stopped verity-setup.service. Aug 13 00:03:14.447273 kernel: loop: module loaded Aug 13 00:03:14.447303 systemd[1]: Mounted dev-hugepages.mount. Aug 13 00:03:14.447332 kernel: fuse: init (API version 7.34) Aug 13 00:03:14.447361 systemd[1]: Mounted dev-mqueue.mount. Aug 13 00:03:14.447395 systemd[1]: Mounted media.mount. Aug 13 00:03:14.447425 systemd[1]: Mounted sys-kernel-debug.mount. Aug 13 00:03:14.447455 systemd[1]: Mounted sys-kernel-tracing.mount. Aug 13 00:03:14.447486 systemd[1]: Mounted tmp.mount. Aug 13 00:03:14.447516 systemd[1]: Finished kmod-static-nodes.service. Aug 13 00:03:14.447547 systemd[1]: modprobe@configfs.service: Deactivated successfully. Aug 13 00:03:14.447577 systemd[1]: Finished modprobe@configfs.service. Aug 13 00:03:14.447607 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:03:14.447637 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:03:14.447670 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 00:03:14.447703 systemd[1]: Finished modprobe@drm.service. Aug 13 00:03:14.447733 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:03:14.447766 systemd-journald[1487]: Journal started Aug 13 00:03:14.447868 systemd-journald[1487]: Runtime Journal (/run/log/journal/ec239a994922fd8b5692073081c84b6e) is 8.0M, max 75.4M, 67.4M free. Aug 13 00:03:09.053000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Aug 13 00:03:09.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:03:09.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:03:09.236000 audit: BPF prog-id=10 op=LOAD Aug 13 00:03:09.236000 audit: BPF prog-id=10 op=UNLOAD Aug 13 00:03:09.236000 audit: BPF prog-id=11 op=LOAD Aug 13 00:03:09.236000 audit: BPF prog-id=11 op=UNLOAD Aug 13 00:03:09.513000 audit[1409]: AVC avc: denied { associate } for pid=1409 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Aug 13 00:03:09.513000 audit[1409]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1392 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:09.513000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 00:03:09.517000 audit[1409]: AVC avc: denied { associate } for pid=1409 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Aug 13 00:03:09.517000 audit[1409]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1392 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:09.517000 audit: CWD cwd="/" Aug 13 00:03:09.517000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:09.517000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:09.517000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 00:03:13.996000 audit: BPF prog-id=12 op=LOAD Aug 13 00:03:13.998000 audit: BPF prog-id=3 op=UNLOAD Aug 13 00:03:14.000000 audit: BPF prog-id=13 op=LOAD Aug 13 00:03:14.003000 audit: BPF prog-id=14 op=LOAD Aug 13 00:03:14.003000 audit: BPF prog-id=4 op=UNLOAD Aug 13 00:03:14.003000 audit: BPF prog-id=5 op=UNLOAD Aug 13 00:03:14.008000 audit: BPF prog-id=15 op=LOAD Aug 13 00:03:14.008000 audit: BPF prog-id=12 op=UNLOAD Aug 13 00:03:14.011000 audit: BPF prog-id=16 op=LOAD Aug 13 00:03:14.013000 audit: BPF prog-id=17 op=LOAD Aug 13 00:03:14.013000 audit: BPF prog-id=13 op=UNLOAD Aug 13 00:03:14.013000 audit: BPF prog-id=14 op=UNLOAD Aug 13 00:03:14.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.025000 audit: BPF prog-id=15 op=UNLOAD Aug 13 00:03:14.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.313000 audit: BPF prog-id=18 op=LOAD Aug 13 00:03:14.313000 audit: BPF prog-id=19 op=LOAD Aug 13 00:03:14.313000 audit: BPF prog-id=20 op=LOAD Aug 13 00:03:14.313000 audit: BPF prog-id=16 op=UNLOAD Aug 13 00:03:14.313000 audit: BPF prog-id=17 op=UNLOAD Aug 13 00:03:14.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.424000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Aug 13 00:03:14.424000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffe06d7690 a2=4000 a3=1 items=0 ppid=1 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:14.424000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Aug 13 00:03:14.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:13.994079 systemd[1]: Queued start job for default target multi-user.target. Aug 13 00:03:09.486100 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:03:13.994101 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Aug 13 00:03:09.487291 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 00:03:14.017436 systemd[1]: systemd-journald.service: Deactivated successfully. Aug 13 00:03:09.487340 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 00:03:09.487405 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Aug 13 00:03:09.487431 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Aug 13 00:03:09.487493 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Aug 13 00:03:09.487524 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Aug 13 00:03:09.487923 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Aug 13 00:03:09.488000 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 00:03:09.488202 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 00:03:09.499481 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Aug 13 00:03:09.499565 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Aug 13 00:03:09.499614 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Aug 13 00:03:14.459550 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:03:14.459618 systemd[1]: Started systemd-journald.service. Aug 13 00:03:14.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:09.499654 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Aug 13 00:03:09.499703 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Aug 13 00:03:09.499740 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Aug 13 00:03:13.092439 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:13Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:03:14.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:13.092970 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:13Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:03:13.093240 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:13Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:03:13.093691 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:13Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:03:13.093799 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:13Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Aug 13 00:03:13.093955 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-08-13T00:03:13Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Aug 13 00:03:14.463985 systemd[1]: modprobe@fuse.service: Deactivated successfully. Aug 13 00:03:14.464347 systemd[1]: Finished modprobe@fuse.service. Aug 13 00:03:14.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.468882 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:03:14.469414 systemd[1]: Finished modprobe@loop.service. Aug 13 00:03:14.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.471889 systemd[1]: Finished systemd-modules-load.service. Aug 13 00:03:14.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.478835 systemd[1]: Finished systemd-network-generator.service. Aug 13 00:03:14.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.481426 systemd[1]: Finished systemd-remount-fs.service. Aug 13 00:03:14.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.484407 systemd[1]: Reached target network-pre.target. Aug 13 00:03:14.489173 systemd[1]: Mounting sys-fs-fuse-connections.mount... Aug 13 00:03:14.502392 systemd[1]: Mounting sys-kernel-config.mount... Aug 13 00:03:14.504115 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Aug 13 00:03:14.523526 systemd[1]: Starting systemd-hwdb-update.service... Aug 13 00:03:14.527493 systemd[1]: Starting systemd-journal-flush.service... Aug 13 00:03:14.529469 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:03:14.531818 systemd[1]: Starting systemd-random-seed.service... Aug 13 00:03:14.539060 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:03:14.541283 systemd[1]: Starting systemd-sysctl.service... Aug 13 00:03:14.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.545617 systemd[1]: Mounted sys-fs-fuse-connections.mount. Aug 13 00:03:14.547819 systemd[1]: Mounted sys-kernel-config.mount. Aug 13 00:03:14.551067 systemd[1]: Finished flatcar-tmpfiles.service. Aug 13 00:03:14.557749 systemd[1]: Starting systemd-sysusers.service... Aug 13 00:03:14.581109 systemd-journald[1487]: Time spent on flushing to /var/log/journal/ec239a994922fd8b5692073081c84b6e is 46.878ms for 1119 entries. Aug 13 00:03:14.581109 systemd-journald[1487]: System Journal (/var/log/journal/ec239a994922fd8b5692073081c84b6e) is 8.0M, max 195.6M, 187.6M free. Aug 13 00:03:14.654654 systemd-journald[1487]: Received client request to flush runtime journal. Aug 13 00:03:14.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.595415 systemd[1]: Finished systemd-random-seed.service. Aug 13 00:03:14.602422 systemd[1]: Reached target first-boot-complete.target. Aug 13 00:03:14.642048 systemd[1]: Finished systemd-sysctl.service. Aug 13 00:03:14.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.656236 systemd[1]: Finished systemd-journal-flush.service. Aug 13 00:03:14.675664 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 00:03:14.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.679921 systemd[1]: Starting systemd-udev-settle.service... Aug 13 00:03:14.701088 udevadm[1528]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Aug 13 00:03:14.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:14.812962 systemd[1]: Finished systemd-sysusers.service. Aug 13 00:03:15.401065 systemd[1]: Finished systemd-hwdb-update.service. Aug 13 00:03:15.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:15.403000 audit: BPF prog-id=21 op=LOAD Aug 13 00:03:15.403000 audit: BPF prog-id=22 op=LOAD Aug 13 00:03:15.403000 audit: BPF prog-id=7 op=UNLOAD Aug 13 00:03:15.403000 audit: BPF prog-id=8 op=UNLOAD Aug 13 00:03:15.405506 systemd[1]: Starting systemd-udevd.service... Aug 13 00:03:15.442660 systemd-udevd[1529]: Using default interface naming scheme 'v252'. Aug 13 00:03:15.506413 systemd[1]: Started systemd-udevd.service. Aug 13 00:03:15.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:15.508000 audit: BPF prog-id=23 op=LOAD Aug 13 00:03:15.512470 systemd[1]: Starting systemd-networkd.service... Aug 13 00:03:15.529000 audit: BPF prog-id=24 op=LOAD Aug 13 00:03:15.529000 audit: BPF prog-id=25 op=LOAD Aug 13 00:03:15.529000 audit: BPF prog-id=26 op=LOAD Aug 13 00:03:15.532165 systemd[1]: Starting systemd-userdbd.service... Aug 13 00:03:15.608939 (udev-worker)[1542]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:03:15.612760 systemd[1]: Started systemd-userdbd.service. Aug 13 00:03:15.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:15.621745 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Aug 13 00:03:15.775035 systemd-networkd[1534]: lo: Link UP Aug 13 00:03:15.775060 systemd-networkd[1534]: lo: Gained carrier Aug 13 00:03:15.775990 systemd-networkd[1534]: Enumeration completed Aug 13 00:03:15.776216 systemd[1]: Started systemd-networkd.service. Aug 13 00:03:15.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:15.780418 systemd[1]: Starting systemd-networkd-wait-online.service... Aug 13 00:03:15.787657 systemd-networkd[1534]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 00:03:15.793164 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:03:15.794003 systemd-networkd[1534]: eth0: Link UP Aug 13 00:03:15.794408 systemd-networkd[1534]: eth0: Gained carrier Aug 13 00:03:15.805396 systemd-networkd[1534]: eth0: DHCPv4 address 172.31.18.161/20, gateway 172.31.16.1 acquired from 172.31.16.1 Aug 13 00:03:16.003347 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 00:03:16.006439 systemd[1]: Finished systemd-udev-settle.service. Aug 13 00:03:16.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.010677 systemd[1]: Starting lvm2-activation-early.service... Aug 13 00:03:16.069792 lvm[1648]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 00:03:16.107599 systemd[1]: Finished lvm2-activation-early.service. Aug 13 00:03:16.109913 systemd[1]: Reached target cryptsetup.target. Aug 13 00:03:16.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.114023 systemd[1]: Starting lvm2-activation.service... Aug 13 00:03:16.129196 lvm[1649]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 00:03:16.166829 systemd[1]: Finished lvm2-activation.service. Aug 13 00:03:16.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.168938 systemd[1]: Reached target local-fs-pre.target. Aug 13 00:03:16.170787 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Aug 13 00:03:16.170827 systemd[1]: Reached target local-fs.target. Aug 13 00:03:16.172563 systemd[1]: Reached target machines.target. Aug 13 00:03:16.176594 systemd[1]: Starting ldconfig.service... Aug 13 00:03:16.189415 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:03:16.189722 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:03:16.191989 systemd[1]: Starting systemd-boot-update.service... Aug 13 00:03:16.196769 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Aug 13 00:03:16.201578 systemd[1]: Starting systemd-machine-id-commit.service... Aug 13 00:03:16.212383 systemd[1]: Starting systemd-sysext.service... Aug 13 00:03:16.216640 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1651 (bootctl) Aug 13 00:03:16.219233 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Aug 13 00:03:16.243584 systemd[1]: Unmounting usr-share-oem.mount... Aug 13 00:03:16.254967 systemd[1]: usr-share-oem.mount: Deactivated successfully. Aug 13 00:03:16.255412 systemd[1]: Unmounted usr-share-oem.mount. Aug 13 00:03:16.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.288908 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Aug 13 00:03:16.290390 kernel: loop0: detected capacity change from 0 to 203944 Aug 13 00:03:16.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.418716 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Aug 13 00:03:16.419737 systemd[1]: Finished systemd-machine-id-commit.service. Aug 13 00:03:16.432615 systemd-fsck[1662]: fsck.fat 4.2 (2021-01-31) Aug 13 00:03:16.432615 systemd-fsck[1662]: /dev/nvme0n1p1: 236 files, 117307/258078 clusters Aug 13 00:03:16.438260 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Aug 13 00:03:16.439943 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Aug 13 00:03:16.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.444920 systemd[1]: Mounting boot.mount... Aug 13 00:03:16.470165 kernel: loop1: detected capacity change from 0 to 203944 Aug 13 00:03:16.474485 systemd[1]: Mounted boot.mount. Aug 13 00:03:16.507153 systemd[1]: Finished systemd-boot-update.service. Aug 13 00:03:16.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.513584 (sd-sysext)[1666]: Using extensions 'kubernetes'. Aug 13 00:03:16.514868 (sd-sysext)[1666]: Merged extensions into '/usr'. Aug 13 00:03:16.552338 systemd[1]: Mounting usr-share-oem.mount... Aug 13 00:03:16.554722 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:03:16.557664 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:03:16.563692 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:03:16.568399 systemd[1]: Starting modprobe@loop.service... Aug 13 00:03:16.570592 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:03:16.570929 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:03:16.577102 systemd[1]: Mounted usr-share-oem.mount. Aug 13 00:03:16.579730 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:03:16.580042 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:03:16.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.584134 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:03:16.584400 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:03:16.587289 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:03:16.587577 systemd[1]: Finished modprobe@loop.service. Aug 13 00:03:16.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.590920 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:03:16.591108 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:03:16.593563 systemd[1]: Finished systemd-sysext.service. Aug 13 00:03:16.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:16.598406 systemd[1]: Starting ensure-sysext.service... Aug 13 00:03:16.605273 systemd[1]: Starting systemd-tmpfiles-setup.service... Aug 13 00:03:16.618925 systemd[1]: Reloading. Aug 13 00:03:16.672312 systemd-tmpfiles[1684]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Aug 13 00:03:16.710754 systemd-tmpfiles[1684]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Aug 13 00:03:16.722704 /usr/lib/systemd/system-generators/torcx-generator[1703]: time="2025-08-13T00:03:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:03:16.722768 /usr/lib/systemd/system-generators/torcx-generator[1703]: time="2025-08-13T00:03:16Z" level=info msg="torcx already run" Aug 13 00:03:16.732216 systemd-tmpfiles[1684]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Aug 13 00:03:16.966095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:03:16.966443 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:03:17.010898 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:03:17.172000 audit: BPF prog-id=27 op=LOAD Aug 13 00:03:17.173000 audit: BPF prog-id=28 op=LOAD Aug 13 00:03:17.173000 audit: BPF prog-id=21 op=UNLOAD Aug 13 00:03:17.173000 audit: BPF prog-id=22 op=UNLOAD Aug 13 00:03:17.179000 audit: BPF prog-id=29 op=LOAD Aug 13 00:03:17.179000 audit: BPF prog-id=23 op=UNLOAD Aug 13 00:03:17.187000 audit: BPF prog-id=30 op=LOAD Aug 13 00:03:17.187000 audit: BPF prog-id=18 op=UNLOAD Aug 13 00:03:17.187000 audit: BPF prog-id=31 op=LOAD Aug 13 00:03:17.187000 audit: BPF prog-id=32 op=LOAD Aug 13 00:03:17.188000 audit: BPF prog-id=19 op=UNLOAD Aug 13 00:03:17.188000 audit: BPF prog-id=20 op=UNLOAD Aug 13 00:03:17.189000 audit: BPF prog-id=33 op=LOAD Aug 13 00:03:17.189000 audit: BPF prog-id=24 op=UNLOAD Aug 13 00:03:17.189000 audit: BPF prog-id=34 op=LOAD Aug 13 00:03:17.189000 audit: BPF prog-id=35 op=LOAD Aug 13 00:03:17.189000 audit: BPF prog-id=25 op=UNLOAD Aug 13 00:03:17.189000 audit: BPF prog-id=26 op=UNLOAD Aug 13 00:03:17.198749 systemd[1]: Finished systemd-tmpfiles-setup.service. Aug 13 00:03:17.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.210103 systemd[1]: Starting audit-rules.service... Aug 13 00:03:17.214723 systemd[1]: Starting clean-ca-certificates.service... Aug 13 00:03:17.221165 systemd[1]: Starting systemd-journal-catalog-update.service... Aug 13 00:03:17.223000 audit: BPF prog-id=36 op=LOAD Aug 13 00:03:17.226710 systemd[1]: Starting systemd-resolved.service... Aug 13 00:03:17.232000 audit: BPF prog-id=37 op=LOAD Aug 13 00:03:17.236675 systemd[1]: Starting systemd-timesyncd.service... Aug 13 00:03:17.242476 systemd[1]: Starting systemd-update-utmp.service... Aug 13 00:03:17.257853 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.262739 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:03:17.269751 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:03:17.274047 systemd[1]: Starting modprobe@loop.service... Aug 13 00:03:17.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.289000 audit[1766]: SYSTEM_BOOT pid=1766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.276428 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.276747 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:03:17.278953 systemd[1]: Finished clean-ca-certificates.service. Aug 13 00:03:17.281597 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 00:03:17.285278 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.285543 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.285726 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:03:17.286036 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 00:03:17.298171 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:03:17.298508 systemd[1]: Finished modprobe@loop.service. Aug 13 00:03:17.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.301478 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:03:17.301829 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:03:17.304998 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.308103 systemd[1]: Starting modprobe@drm.service... Aug 13 00:03:17.310209 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.310699 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:03:17.311147 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.311482 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 00:03:17.317772 systemd[1]: Finished systemd-update-utmp.service. Aug 13 00:03:17.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.325288 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:03:17.325580 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:03:17.327833 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:03:17.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.329682 systemd[1]: Finished ensure-sysext.service. Aug 13 00:03:17.335291 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 00:03:17.335574 systemd[1]: Finished modprobe@drm.service. Aug 13 00:03:17.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.387025 systemd[1]: Finished systemd-journal-catalog-update.service. Aug 13 00:03:17.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:17.443592 augenrules[1784]: No rules Aug 13 00:03:17.442000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Aug 13 00:03:17.442000 audit[1784]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd7a4c640 a2=420 a3=0 items=0 ppid=1760 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:17.442000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Aug 13 00:03:17.444465 systemd[1]: Started systemd-timesyncd.service. Aug 13 00:03:17.446627 systemd[1]: Reached target time-set.target. Aug 13 00:03:17.449431 systemd[1]: Finished audit-rules.service. Aug 13 00:03:17.467299 systemd-networkd[1534]: eth0: Gained IPv6LL Aug 13 00:03:17.469977 systemd[1]: Finished systemd-networkd-wait-online.service. Aug 13 00:03:17.487051 systemd-resolved[1764]: Positive Trust Anchors: Aug 13 00:03:17.487078 systemd-resolved[1764]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 00:03:17.487150 systemd-resolved[1764]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 00:03:17.505024 systemd-timesyncd[1765]: Contacted time server 72.46.61.205:123 (0.flatcar.pool.ntp.org). Aug 13 00:03:17.505295 systemd-timesyncd[1765]: Initial clock synchronization to Wed 2025-08-13 00:03:17.823146 UTC. Aug 13 00:03:17.549972 systemd-resolved[1764]: Defaulting to hostname 'linux'. Aug 13 00:03:17.553619 systemd[1]: Started systemd-resolved.service. Aug 13 00:03:17.555646 systemd[1]: Reached target network.target. Aug 13 00:03:17.557421 systemd[1]: Reached target network-online.target. Aug 13 00:03:17.559297 systemd[1]: Reached target nss-lookup.target. Aug 13 00:03:17.791639 ldconfig[1650]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Aug 13 00:03:17.799890 systemd[1]: Finished ldconfig.service. Aug 13 00:03:17.803897 systemd[1]: Starting systemd-update-done.service... Aug 13 00:03:17.819506 systemd[1]: Finished systemd-update-done.service. Aug 13 00:03:17.821655 systemd[1]: Reached target sysinit.target. Aug 13 00:03:17.823597 systemd[1]: Started motdgen.path. Aug 13 00:03:17.825389 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Aug 13 00:03:17.828188 systemd[1]: Started logrotate.timer. Aug 13 00:03:17.830012 systemd[1]: Started mdadm.timer. Aug 13 00:03:17.831481 systemd[1]: Started systemd-tmpfiles-clean.timer. Aug 13 00:03:17.833400 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Aug 13 00:03:17.833468 systemd[1]: Reached target paths.target. Aug 13 00:03:17.835217 systemd[1]: Reached target timers.target. Aug 13 00:03:17.837892 systemd[1]: Listening on dbus.socket. Aug 13 00:03:17.841623 systemd[1]: Starting docker.socket... Aug 13 00:03:17.848642 systemd[1]: Listening on sshd.socket. Aug 13 00:03:17.850794 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:03:17.851833 systemd[1]: Listening on docker.socket. Aug 13 00:03:17.853856 systemd[1]: Reached target sockets.target. Aug 13 00:03:17.855737 systemd[1]: Reached target basic.target. Aug 13 00:03:17.857541 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.857717 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 00:03:17.859972 systemd[1]: Started amazon-ssm-agent.service. Aug 13 00:03:17.865100 systemd[1]: Starting containerd.service... Aug 13 00:03:17.869996 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Aug 13 00:03:17.874573 systemd[1]: Starting dbus.service... Aug 13 00:03:17.878346 systemd[1]: Starting enable-oem-cloudinit.service... Aug 13 00:03:17.882626 systemd[1]: Starting extend-filesystems.service... Aug 13 00:03:17.890104 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Aug 13 00:03:17.893073 systemd[1]: Starting kubelet.service... Aug 13 00:03:17.896929 systemd[1]: Starting motdgen.service... Aug 13 00:03:17.901732 systemd[1]: Started nvidia.service. Aug 13 00:03:17.907554 systemd[1]: Starting ssh-key-proc-cmdline.service... Aug 13 00:03:17.911997 systemd[1]: Starting sshd-keygen.service... Aug 13 00:03:17.921261 systemd[1]: Starting systemd-logind.service... Aug 13 00:03:17.926055 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:03:17.995468 jq[1808]: true Aug 13 00:03:17.995879 jq[1797]: false Aug 13 00:03:17.926231 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Aug 13 00:03:17.927258 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Aug 13 00:03:17.929407 systemd[1]: Starting update-engine.service... Aug 13 00:03:17.934697 systemd[1]: Starting update-ssh-keys-after-ignition.service... Aug 13 00:03:17.995610 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Aug 13 00:03:17.995950 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Aug 13 00:03:18.054530 jq[1815]: true Aug 13 00:03:18.055669 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Aug 13 00:03:18.056133 systemd[1]: Finished ssh-key-proc-cmdline.service. Aug 13 00:03:18.193147 extend-filesystems[1798]: Found loop1 Aug 13 00:03:18.195574 extend-filesystems[1798]: Found nvme0n1 Aug 13 00:03:18.195574 extend-filesystems[1798]: Found nvme0n1p1 Aug 13 00:03:18.195574 extend-filesystems[1798]: Found nvme0n1p2 Aug 13 00:03:18.195574 extend-filesystems[1798]: Found nvme0n1p3 Aug 13 00:03:18.195574 extend-filesystems[1798]: Found usr Aug 13 00:03:18.195574 extend-filesystems[1798]: Found nvme0n1p4 Aug 13 00:03:18.209731 extend-filesystems[1798]: Found nvme0n1p6 Aug 13 00:03:18.209731 extend-filesystems[1798]: Found nvme0n1p7 Aug 13 00:03:18.209731 extend-filesystems[1798]: Found nvme0n1p9 Aug 13 00:03:18.209731 extend-filesystems[1798]: Checking size of /dev/nvme0n1p9 Aug 13 00:03:18.227136 systemd[1]: motdgen.service: Deactivated successfully. Aug 13 00:03:18.227521 systemd[1]: Finished motdgen.service. Aug 13 00:03:18.260854 dbus-daemon[1796]: [system] SELinux support is enabled Aug 13 00:03:18.267818 systemd[1]: Started dbus.service. Aug 13 00:03:18.276050 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Aug 13 00:03:18.276124 systemd[1]: Reached target system-config.target. Aug 13 00:03:18.279294 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Aug 13 00:03:18.279347 systemd[1]: Reached target user-config.target. Aug 13 00:03:18.305268 extend-filesystems[1798]: Resized partition /dev/nvme0n1p9 Aug 13 00:03:18.325290 dbus-daemon[1796]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1534 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Aug 13 00:03:18.339993 systemd[1]: Starting systemd-hostnamed.service... Aug 13 00:03:18.345946 extend-filesystems[1854]: resize2fs 1.46.5 (30-Dec-2021) Aug 13 00:03:18.362495 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Aug 13 00:03:18.424586 update_engine[1807]: I0813 00:03:18.423910 1807 main.cc:92] Flatcar Update Engine starting Aug 13 00:03:18.444021 systemd[1]: Started update-engine.service. Aug 13 00:03:18.447299 bash[1850]: Updated "/home/core/.ssh/authorized_keys" Aug 13 00:03:18.450683 systemd[1]: Started locksmithd.service. Aug 13 00:03:18.452726 update_engine[1807]: I0813 00:03:18.452684 1807 update_check_scheduler.cc:74] Next update check in 2m13s Aug 13 00:03:18.456508 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Aug 13 00:03:18.454293 systemd[1]: Finished update-ssh-keys-after-ignition.service. Aug 13 00:03:18.480462 extend-filesystems[1854]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Aug 13 00:03:18.480462 extend-filesystems[1854]: old_desc_blocks = 1, new_desc_blocks = 1 Aug 13 00:03:18.480462 extend-filesystems[1854]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Aug 13 00:03:18.490928 extend-filesystems[1798]: Resized filesystem in /dev/nvme0n1p9 Aug 13 00:03:18.497723 env[1812]: time="2025-08-13T00:03:18.497496903Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Aug 13 00:03:18.501972 systemd[1]: extend-filesystems.service: Deactivated successfully. Aug 13 00:03:18.502370 systemd[1]: Finished extend-filesystems.service. Aug 13 00:03:18.505725 amazon-ssm-agent[1793]: 2025/08/13 00:03:18 Failed to load instance info from vault. RegistrationKey does not exist. Aug 13 00:03:18.535596 amazon-ssm-agent[1793]: Initializing new seelog logger Aug 13 00:03:18.536022 amazon-ssm-agent[1793]: New Seelog Logger Creation Complete Aug 13 00:03:18.536163 amazon-ssm-agent[1793]: 2025/08/13 00:03:18 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Aug 13 00:03:18.536163 amazon-ssm-agent[1793]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Aug 13 00:03:18.536807 amazon-ssm-agent[1793]: 2025/08/13 00:03:18 processing appconfig overrides Aug 13 00:03:18.614740 systemd-logind[1806]: Watching system buttons on /dev/input/event0 (Power Button) Aug 13 00:03:18.622290 systemd-logind[1806]: Watching system buttons on /dev/input/event1 (Sleep Button) Aug 13 00:03:18.623490 systemd-logind[1806]: New seat seat0. Aug 13 00:03:18.628194 systemd[1]: nvidia.service: Deactivated successfully. Aug 13 00:03:18.633150 systemd[1]: Started systemd-logind.service. Aug 13 00:03:18.663922 env[1812]: time="2025-08-13T00:03:18.663834854Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Aug 13 00:03:18.680744 env[1812]: time="2025-08-13T00:03:18.664133901Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:03:18.687884 env[1812]: time="2025-08-13T00:03:18.687793780Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.189-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:03:18.687884 env[1812]: time="2025-08-13T00:03:18.687872051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:03:18.688363 env[1812]: time="2025-08-13T00:03:18.688300165Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:03:18.688456 env[1812]: time="2025-08-13T00:03:18.688358447Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Aug 13 00:03:18.688456 env[1812]: time="2025-08-13T00:03:18.688393983Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Aug 13 00:03:18.688456 env[1812]: time="2025-08-13T00:03:18.688419225Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Aug 13 00:03:18.688642 env[1812]: time="2025-08-13T00:03:18.688599063Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:03:18.689134 env[1812]: time="2025-08-13T00:03:18.689079046Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:03:18.689433 env[1812]: time="2025-08-13T00:03:18.689373302Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:03:18.689516 env[1812]: time="2025-08-13T00:03:18.689424934Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Aug 13 00:03:18.689576 env[1812]: time="2025-08-13T00:03:18.689548111Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Aug 13 00:03:18.689660 env[1812]: time="2025-08-13T00:03:18.689573628Z" level=info msg="metadata content store policy set" policy=shared Aug 13 00:03:18.714078 env[1812]: time="2025-08-13T00:03:18.713995580Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Aug 13 00:03:18.714248 env[1812]: time="2025-08-13T00:03:18.714085280Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Aug 13 00:03:18.714248 env[1812]: time="2025-08-13T00:03:18.714121090Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Aug 13 00:03:18.714248 env[1812]: time="2025-08-13T00:03:18.714208395Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.714442 env[1812]: time="2025-08-13T00:03:18.714245977Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.714442 env[1812]: time="2025-08-13T00:03:18.714280116Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.714442 env[1812]: time="2025-08-13T00:03:18.714315240Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.714906 env[1812]: time="2025-08-13T00:03:18.714842912Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.715013 env[1812]: time="2025-08-13T00:03:18.714906959Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.715013 env[1812]: time="2025-08-13T00:03:18.714944204Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.715013 env[1812]: time="2025-08-13T00:03:18.714978142Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.715259 env[1812]: time="2025-08-13T00:03:18.715010696Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Aug 13 00:03:18.715327 env[1812]: time="2025-08-13T00:03:18.715274994Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Aug 13 00:03:18.715493 env[1812]: time="2025-08-13T00:03:18.715443252Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Aug 13 00:03:18.715912 env[1812]: time="2025-08-13T00:03:18.715861759Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Aug 13 00:03:18.716015 env[1812]: time="2025-08-13T00:03:18.715963987Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716015 env[1812]: time="2025-08-13T00:03:18.716000047Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Aug 13 00:03:18.716372 env[1812]: time="2025-08-13T00:03:18.716328790Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716526 env[1812]: time="2025-08-13T00:03:18.716481228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716595 env[1812]: time="2025-08-13T00:03:18.716530738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716595 env[1812]: time="2025-08-13T00:03:18.716563242Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716730 env[1812]: time="2025-08-13T00:03:18.716596095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716730 env[1812]: time="2025-08-13T00:03:18.716627052Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716730 env[1812]: time="2025-08-13T00:03:18.716659331Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716730 env[1812]: time="2025-08-13T00:03:18.716690001Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.716957 env[1812]: time="2025-08-13T00:03:18.716725025Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Aug 13 00:03:18.717053 env[1812]: time="2025-08-13T00:03:18.717005231Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.717132 env[1812]: time="2025-08-13T00:03:18.717052920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.717132 env[1812]: time="2025-08-13T00:03:18.717096404Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.717132 env[1812]: time="2025-08-13T00:03:18.717127984Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Aug 13 00:03:18.717344 env[1812]: time="2025-08-13T00:03:18.717181750Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Aug 13 00:03:18.717344 env[1812]: time="2025-08-13T00:03:18.717231235Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Aug 13 00:03:18.717344 env[1812]: time="2025-08-13T00:03:18.717276479Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Aug 13 00:03:18.717498 env[1812]: time="2025-08-13T00:03:18.717342672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Aug 13 00:03:18.717788 env[1812]: time="2025-08-13T00:03:18.717675683Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Aug 13 00:03:18.719862 env[1812]: time="2025-08-13T00:03:18.717791935Z" level=info msg="Connect containerd service" Aug 13 00:03:18.719862 env[1812]: time="2025-08-13T00:03:18.717852526Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Aug 13 00:03:18.720518 env[1812]: time="2025-08-13T00:03:18.719991999Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 00:03:18.720664 env[1812]: time="2025-08-13T00:03:18.720615361Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Aug 13 00:03:18.720775 env[1812]: time="2025-08-13T00:03:18.720729392Z" level=info msg=serving... address=/run/containerd/containerd.sock Aug 13 00:03:18.720942 systemd[1]: Started containerd.service. Aug 13 00:03:18.733735 env[1812]: time="2025-08-13T00:03:18.733659625Z" level=info msg="containerd successfully booted in 0.270716s" Aug 13 00:03:18.737079 env[1812]: time="2025-08-13T00:03:18.733996554Z" level=info msg="Start subscribing containerd event" Aug 13 00:03:18.737079 env[1812]: time="2025-08-13T00:03:18.734079130Z" level=info msg="Start recovering state" Aug 13 00:03:18.737079 env[1812]: time="2025-08-13T00:03:18.734213076Z" level=info msg="Start event monitor" Aug 13 00:03:18.737079 env[1812]: time="2025-08-13T00:03:18.734245966Z" level=info msg="Start snapshots syncer" Aug 13 00:03:18.737079 env[1812]: time="2025-08-13T00:03:18.734270934Z" level=info msg="Start cni network conf syncer for default" Aug 13 00:03:18.737079 env[1812]: time="2025-08-13T00:03:18.734291409Z" level=info msg="Start streaming server" Aug 13 00:03:18.857525 dbus-daemon[1796]: [system] Successfully activated service 'org.freedesktop.hostname1' Aug 13 00:03:18.857823 systemd[1]: Started systemd-hostnamed.service. Aug 13 00:03:18.863079 dbus-daemon[1796]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1856 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Aug 13 00:03:18.868436 systemd[1]: Starting polkit.service... Aug 13 00:03:18.905445 polkitd[1919]: Started polkitd version 121 Aug 13 00:03:18.943404 polkitd[1919]: Loading rules from directory /etc/polkit-1/rules.d Aug 13 00:03:18.945123 polkitd[1919]: Loading rules from directory /usr/share/polkit-1/rules.d Aug 13 00:03:18.951498 polkitd[1919]: Finished loading, compiling and executing 2 rules Aug 13 00:03:18.956539 dbus-daemon[1796]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Aug 13 00:03:18.956838 systemd[1]: Started polkit.service. Aug 13 00:03:18.960289 polkitd[1919]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Aug 13 00:03:18.996937 systemd-hostnamed[1856]: Hostname set to (transient) Aug 13 00:03:18.997105 systemd-resolved[1764]: System hostname changed to 'ip-172-31-18-161'. Aug 13 00:03:19.098612 coreos-metadata[1795]: Aug 13 00:03:19.098 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Aug 13 00:03:19.108025 coreos-metadata[1795]: Aug 13 00:03:19.107 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Aug 13 00:03:19.111040 coreos-metadata[1795]: Aug 13 00:03:19.110 INFO Fetch successful Aug 13 00:03:19.111242 coreos-metadata[1795]: Aug 13 00:03:19.111 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Aug 13 00:03:19.115132 coreos-metadata[1795]: Aug 13 00:03:19.114 INFO Fetch successful Aug 13 00:03:19.118999 unknown[1795]: wrote ssh authorized keys file for user: core Aug 13 00:03:19.153495 update-ssh-keys[1961]: Updated "/home/core/.ssh/authorized_keys" Aug 13 00:03:19.155869 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Aug 13 00:03:19.334540 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Create new startup processor Aug 13 00:03:19.337037 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [LongRunningPluginsManager] registered plugins: {} Aug 13 00:03:19.337037 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing bookkeeping folders Aug 13 00:03:19.337037 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO removing the completed state files Aug 13 00:03:19.337037 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing bookkeeping folders for long running plugins Aug 13 00:03:19.337037 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing healthcheck folders for long running plugins Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing locations for inventory plugin Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing default location for custom inventory Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing default location for file inventory Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Initializing default location for role inventory Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Init the cloudwatchlogs publisher Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:configureDocker Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:runDockerAction Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:configurePackage Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:runDocument Aug 13 00:03:19.337439 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:softwareInventory Aug 13 00:03:19.337966 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:updateSsmAgent Aug 13 00:03:19.337966 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:downloadContent Aug 13 00:03:19.337966 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:runPowerShellScript Aug 13 00:03:19.337966 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform independent plugin aws:refreshAssociation Aug 13 00:03:19.337966 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Successfully loaded platform dependent plugin aws:runShellScript Aug 13 00:03:19.337966 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Aug 13 00:03:19.337966 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO OS: linux, Arch: arm64 Aug 13 00:03:19.339869 amazon-ssm-agent[1793]: datastore file /var/lib/amazon/ssm/i-0ba708ef472c8da90/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Aug 13 00:03:19.465080 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] Starting document processing engine... Aug 13 00:03:19.559138 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] [EngineProcessor] Starting Aug 13 00:03:19.653796 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Aug 13 00:03:19.714563 locksmithd[1874]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Aug 13 00:03:19.748166 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] Starting message polling Aug 13 00:03:19.842849 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] Starting send replies to MDS Aug 13 00:03:19.937807 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [instanceID=i-0ba708ef472c8da90] Starting association polling Aug 13 00:03:20.033007 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Aug 13 00:03:20.128324 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] [Association] Launching response handler Aug 13 00:03:20.223873 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Aug 13 00:03:20.319695 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Aug 13 00:03:20.415478 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Aug 13 00:03:20.511580 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] Starting session document processing engine... Aug 13 00:03:20.607964 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] [EngineProcessor] Starting Aug 13 00:03:20.704398 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Aug 13 00:03:20.801132 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [OfflineService] Starting document processing engine... Aug 13 00:03:20.898094 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [OfflineService] [EngineProcessor] Starting Aug 13 00:03:20.995171 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [OfflineService] [EngineProcessor] Initial processing Aug 13 00:03:21.092522 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] listening reply. Aug 13 00:03:21.113435 systemd[1]: Started kubelet.service. Aug 13 00:03:21.190052 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [LongRunningPluginsManager] starting long running plugin manager Aug 13 00:03:21.287706 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [HealthCheck] HealthCheck reporting agent health. Aug 13 00:03:21.385617 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Aug 13 00:03:21.483813 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [OfflineService] Starting message polling Aug 13 00:03:21.582096 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [OfflineService] Starting send replies to MDS Aug 13 00:03:21.680674 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0ba708ef472c8da90, requestId: 1f9e3abb-192a-4ce8-a911-8b8da19830ab Aug 13 00:03:21.779377 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Aug 13 00:03:21.878244 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [StartupProcessor] Executing startup processor tasks Aug 13 00:03:21.977344 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Aug 13 00:03:22.076685 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Aug 13 00:03:22.119550 kubelet[1995]: E0813 00:03:22.119462 1995 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 00:03:22.123135 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 00:03:22.123480 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 00:03:22.123937 systemd[1]: kubelet.service: Consumed 1.596s CPU time. Aug 13 00:03:22.176094 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Aug 13 00:03:22.275717 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ba708ef472c8da90?role=subscribe&stream=input Aug 13 00:03:22.375603 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ba708ef472c8da90?role=subscribe&stream=input Aug 13 00:03:22.475534 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] Starting receiving message from control channel Aug 13 00:03:22.575732 amazon-ssm-agent[1793]: 2025-08-13 00:03:19 INFO [MessageGatewayService] [EngineProcessor] Initial processing Aug 13 00:03:23.314399 sshd_keygen[1824]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Aug 13 00:03:23.353369 systemd[1]: Finished sshd-keygen.service. Aug 13 00:03:23.358342 systemd[1]: Starting issuegen.service... Aug 13 00:03:23.369450 systemd[1]: issuegen.service: Deactivated successfully. Aug 13 00:03:23.369817 systemd[1]: Finished issuegen.service. Aug 13 00:03:23.374805 systemd[1]: Starting systemd-user-sessions.service... Aug 13 00:03:23.395839 systemd[1]: Finished systemd-user-sessions.service. Aug 13 00:03:23.400956 systemd[1]: Started getty@tty1.service. Aug 13 00:03:23.405838 systemd[1]: Started serial-getty@ttyS0.service. Aug 13 00:03:23.412853 systemd[1]: Reached target getty.target. Aug 13 00:03:23.415075 systemd[1]: Reached target multi-user.target. Aug 13 00:03:23.420014 systemd[1]: Starting systemd-update-utmp-runlevel.service... Aug 13 00:03:23.440902 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Aug 13 00:03:23.441332 systemd[1]: Finished systemd-update-utmp-runlevel.service. Aug 13 00:03:23.443816 systemd[1]: Startup finished in 1.219s (kernel) + 8.252s (initrd) + 14.583s (userspace) = 24.055s. Aug 13 00:03:26.356382 systemd[1]: Created slice system-sshd.slice. Aug 13 00:03:26.358777 systemd[1]: Started sshd@0-172.31.18.161:22-139.178.89.65:37424.service. Aug 13 00:03:26.743851 sshd[2016]: Accepted publickey for core from 139.178.89.65 port 37424 ssh2: RSA SHA256:VHsMFr69bquTAmMxwTFVl2uJICDxuaiLF9bCAtZNNGI Aug 13 00:03:26.749693 sshd[2016]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:26.770345 systemd[1]: Created slice user-500.slice. Aug 13 00:03:26.772806 systemd[1]: Starting user-runtime-dir@500.service... Aug 13 00:03:26.782256 systemd-logind[1806]: New session 1 of user core. Aug 13 00:03:26.793256 systemd[1]: Finished user-runtime-dir@500.service. Aug 13 00:03:26.797170 systemd[1]: Starting user@500.service... Aug 13 00:03:26.804426 (systemd)[2019]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:26.986209 systemd[2019]: Queued start job for default target default.target. Aug 13 00:03:26.987267 systemd[2019]: Reached target paths.target. Aug 13 00:03:26.987321 systemd[2019]: Reached target sockets.target. Aug 13 00:03:26.987354 systemd[2019]: Reached target timers.target. Aug 13 00:03:26.987385 systemd[2019]: Reached target basic.target. Aug 13 00:03:26.987482 systemd[2019]: Reached target default.target. Aug 13 00:03:26.987547 systemd[2019]: Startup finished in 170ms. Aug 13 00:03:26.988533 systemd[1]: Started user@500.service. Aug 13 00:03:26.992370 systemd[1]: Started session-1.scope. Aug 13 00:03:27.141004 systemd[1]: Started sshd@1-172.31.18.161:22-139.178.89.65:37426.service. Aug 13 00:03:27.317665 sshd[2028]: Accepted publickey for core from 139.178.89.65 port 37426 ssh2: RSA SHA256:VHsMFr69bquTAmMxwTFVl2uJICDxuaiLF9bCAtZNNGI Aug 13 00:03:27.320746 sshd[2028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:27.329430 systemd[1]: Started session-2.scope. Aug 13 00:03:27.331279 systemd-logind[1806]: New session 2 of user core. Aug 13 00:03:27.463931 sshd[2028]: pam_unix(sshd:session): session closed for user core Aug 13 00:03:27.470090 systemd[1]: sshd@1-172.31.18.161:22-139.178.89.65:37426.service: Deactivated successfully. Aug 13 00:03:27.471399 systemd[1]: session-2.scope: Deactivated successfully. Aug 13 00:03:27.471400 systemd-logind[1806]: Session 2 logged out. Waiting for processes to exit. Aug 13 00:03:27.473384 systemd-logind[1806]: Removed session 2. Aug 13 00:03:27.492565 systemd[1]: Started sshd@2-172.31.18.161:22-139.178.89.65:37440.service. Aug 13 00:03:27.609121 amazon-ssm-agent[1793]: 2025-08-13 00:03:27 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Aug 13 00:03:27.665351 sshd[2034]: Accepted publickey for core from 139.178.89.65 port 37440 ssh2: RSA SHA256:VHsMFr69bquTAmMxwTFVl2uJICDxuaiLF9bCAtZNNGI Aug 13 00:03:27.668400 sshd[2034]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:27.677085 systemd[1]: Started session-3.scope. Aug 13 00:03:27.678203 systemd-logind[1806]: New session 3 of user core. Aug 13 00:03:27.802528 sshd[2034]: pam_unix(sshd:session): session closed for user core Aug 13 00:03:27.807573 systemd[1]: sshd@2-172.31.18.161:22-139.178.89.65:37440.service: Deactivated successfully. Aug 13 00:03:27.808887 systemd[1]: session-3.scope: Deactivated successfully. Aug 13 00:03:27.810076 systemd-logind[1806]: Session 3 logged out. Waiting for processes to exit. Aug 13 00:03:27.812349 systemd-logind[1806]: Removed session 3. Aug 13 00:03:27.831891 systemd[1]: Started sshd@3-172.31.18.161:22-139.178.89.65:37454.service. Aug 13 00:03:28.006336 sshd[2040]: Accepted publickey for core from 139.178.89.65 port 37454 ssh2: RSA SHA256:VHsMFr69bquTAmMxwTFVl2uJICDxuaiLF9bCAtZNNGI Aug 13 00:03:28.008869 sshd[2040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:28.017219 systemd-logind[1806]: New session 4 of user core. Aug 13 00:03:28.018180 systemd[1]: Started session-4.scope. Aug 13 00:03:28.151259 sshd[2040]: pam_unix(sshd:session): session closed for user core Aug 13 00:03:28.157347 systemd-logind[1806]: Session 4 logged out. Waiting for processes to exit. Aug 13 00:03:28.159845 systemd[1]: sshd@3-172.31.18.161:22-139.178.89.65:37454.service: Deactivated successfully. Aug 13 00:03:28.161080 systemd[1]: session-4.scope: Deactivated successfully. Aug 13 00:03:28.162086 systemd-logind[1806]: Removed session 4. Aug 13 00:03:28.182170 systemd[1]: Started sshd@4-172.31.18.161:22-139.178.89.65:37458.service. Aug 13 00:03:28.356106 sshd[2046]: Accepted publickey for core from 139.178.89.65 port 37458 ssh2: RSA SHA256:VHsMFr69bquTAmMxwTFVl2uJICDxuaiLF9bCAtZNNGI Aug 13 00:03:28.358677 sshd[2046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:28.367544 systemd[1]: Started session-5.scope. Aug 13 00:03:28.369243 systemd-logind[1806]: New session 5 of user core. Aug 13 00:03:28.556938 sudo[2049]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Aug 13 00:03:28.558207 sudo[2049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:03:28.572389 dbus-daemon[1796]: avc: received setenforce notice (enforcing=1) Aug 13 00:03:28.574217 sudo[2049]: pam_unix(sudo:session): session closed for user root Aug 13 00:03:28.600039 sshd[2046]: pam_unix(sshd:session): session closed for user core Aug 13 00:03:28.605341 systemd[1]: session-5.scope: Deactivated successfully. Aug 13 00:03:28.606861 systemd[1]: sshd@4-172.31.18.161:22-139.178.89.65:37458.service: Deactivated successfully. Aug 13 00:03:28.607155 systemd-logind[1806]: Session 5 logged out. Waiting for processes to exit. Aug 13 00:03:28.609573 systemd-logind[1806]: Removed session 5. Aug 13 00:03:28.628382 systemd[1]: Started sshd@5-172.31.18.161:22-139.178.89.65:37462.service. Aug 13 00:03:28.799689 sshd[2053]: Accepted publickey for core from 139.178.89.65 port 37462 ssh2: RSA SHA256:VHsMFr69bquTAmMxwTFVl2uJICDxuaiLF9bCAtZNNGI Aug 13 00:03:28.802803 sshd[2053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:28.811245 systemd[1]: Started session-6.scope. Aug 13 00:03:28.813250 systemd-logind[1806]: New session 6 of user core. Aug 13 00:03:28.921480 sudo[2057]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Aug 13 00:03:28.922036 sudo[2057]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:03:28.927446 sudo[2057]: pam_unix(sudo:session): session closed for user root Aug 13 00:03:28.937011 sudo[2056]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Aug 13 00:03:28.937584 sudo[2056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:03:28.955201 systemd[1]: Stopping audit-rules.service... Aug 13 00:03:28.957000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 00:03:28.960327 kernel: kauditd_printk_skb: 106 callbacks suppressed Aug 13 00:03:28.960390 kernel: audit: type=1305 audit(1755043408.957:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 00:03:28.960586 auditctl[2060]: No rules Aug 13 00:03:28.966306 systemd[1]: audit-rules.service: Deactivated successfully. Aug 13 00:03:28.957000 audit[2060]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd80ca310 a2=420 a3=0 items=0 ppid=1 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:28.978389 kernel: audit: type=1300 audit(1755043408.957:199): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd80ca310 a2=420 a3=0 items=0 ppid=1 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:28.966677 systemd[1]: Stopped audit-rules.service. Aug 13 00:03:28.977314 systemd[1]: Starting audit-rules.service... Aug 13 00:03:28.957000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Aug 13 00:03:28.983018 kernel: audit: type=1327 audit(1755043408.957:199): proctitle=2F7362696E2F617564697463746C002D44 Aug 13 00:03:28.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:28.991602 kernel: audit: type=1131 audit(1755043408.965:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.010607 augenrules[2077]: No rules Aug 13 00:03:29.012263 systemd[1]: Finished audit-rules.service. Aug 13 00:03:29.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.022221 sudo[2056]: pam_unix(sudo:session): session closed for user root Aug 13 00:03:29.022000 audit[2056]: USER_END pid=2056 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.033180 kernel: audit: type=1130 audit(1755043409.011:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.033308 kernel: audit: type=1106 audit(1755043409.022:202): pid=2056 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.022000 audit[2056]: CRED_DISP pid=2056 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.042110 kernel: audit: type=1104 audit(1755043409.022:203): pid=2056 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.055452 sshd[2053]: pam_unix(sshd:session): session closed for user core Aug 13 00:03:29.056000 audit[2053]: USER_END pid=2053 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.056000 audit[2053]: CRED_DISP pid=2053 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.070351 systemd[1]: sshd@5-172.31.18.161:22-139.178.89.65:37462.service: Deactivated successfully. Aug 13 00:03:29.071592 systemd[1]: session-6.scope: Deactivated successfully. Aug 13 00:03:29.079702 kernel: audit: type=1106 audit(1755043409.056:204): pid=2053 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.079838 kernel: audit: type=1104 audit(1755043409.056:205): pid=2053 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.18.161:22-139.178.89.65:37462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.082187 kernel: audit: type=1131 audit(1755043409.069:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.18.161:22-139.178.89.65:37462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.081537 systemd-logind[1806]: Session 6 logged out. Waiting for processes to exit. Aug 13 00:03:29.089266 systemd[1]: Started sshd@6-172.31.18.161:22-139.178.89.65:47248.service. Aug 13 00:03:29.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.161:22-139.178.89.65:47248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.095332 systemd-logind[1806]: Removed session 6. Aug 13 00:03:29.263000 audit[2083]: USER_ACCT pid=2083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.264905 sshd[2083]: Accepted publickey for core from 139.178.89.65 port 47248 ssh2: RSA SHA256:VHsMFr69bquTAmMxwTFVl2uJICDxuaiLF9bCAtZNNGI Aug 13 00:03:29.265000 audit[2083]: CRED_ACQ pid=2083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.265000 audit[2083]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcbcee3e0 a2=3 a3=1 items=0 ppid=1 pid=2083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:29.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 00:03:29.268102 sshd[2083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:03:29.277207 systemd[1]: Started session-7.scope. Aug 13 00:03:29.279313 systemd-logind[1806]: New session 7 of user core. Aug 13 00:03:29.287000 audit[2083]: USER_START pid=2083 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.290000 audit[2085]: CRED_ACQ pid=2085 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:29.386000 audit[2086]: USER_ACCT pid=2086 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.388294 sudo[2086]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Aug 13 00:03:29.387000 audit[2086]: CRED_REFR pid=2086 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.389574 sudo[2086]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:03:29.392000 audit[2086]: USER_START pid=2086 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:29.414572 systemd[1]: Starting coreos-metadata.service... Aug 13 00:03:29.582639 coreos-metadata[2090]: Aug 13 00:03:29.582 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Aug 13 00:03:29.583769 coreos-metadata[2090]: Aug 13 00:03:29.583 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Aug 13 00:03:29.584454 coreos-metadata[2090]: Aug 13 00:03:29.584 INFO Fetch successful Aug 13 00:03:29.584903 coreos-metadata[2090]: Aug 13 00:03:29.584 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Aug 13 00:03:29.585339 coreos-metadata[2090]: Aug 13 00:03:29.585 INFO Fetch successful Aug 13 00:03:29.585761 coreos-metadata[2090]: Aug 13 00:03:29.585 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Aug 13 00:03:29.586293 coreos-metadata[2090]: Aug 13 00:03:29.585 INFO Fetch successful Aug 13 00:03:29.586729 coreos-metadata[2090]: Aug 13 00:03:29.586 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Aug 13 00:03:29.587233 coreos-metadata[2090]: Aug 13 00:03:29.586 INFO Fetch successful Aug 13 00:03:29.587632 coreos-metadata[2090]: Aug 13 00:03:29.587 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Aug 13 00:03:29.588000 coreos-metadata[2090]: Aug 13 00:03:29.587 INFO Fetch successful Aug 13 00:03:29.588297 coreos-metadata[2090]: Aug 13 00:03:29.588 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Aug 13 00:03:29.588556 coreos-metadata[2090]: Aug 13 00:03:29.588 INFO Fetch successful Aug 13 00:03:29.588811 coreos-metadata[2090]: Aug 13 00:03:29.588 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Aug 13 00:03:29.589098 coreos-metadata[2090]: Aug 13 00:03:29.588 INFO Fetch successful Aug 13 00:03:29.589389 coreos-metadata[2090]: Aug 13 00:03:29.589 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Aug 13 00:03:29.589646 coreos-metadata[2090]: Aug 13 00:03:29.589 INFO Fetch successful Aug 13 00:03:29.603480 systemd[1]: Finished coreos-metadata.service. Aug 13 00:03:29.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:30.730666 systemd[1]: Stopped kubelet.service. Aug 13 00:03:30.731010 systemd[1]: kubelet.service: Consumed 1.596s CPU time. Aug 13 00:03:30.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:30.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:30.734975 systemd[1]: Starting kubelet.service... Aug 13 00:03:30.799846 systemd[1]: Reloading. Aug 13 00:03:30.975333 /usr/lib/systemd/system-generators/torcx-generator[2147]: time="2025-08-13T00:03:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:03:30.975405 /usr/lib/systemd/system-generators/torcx-generator[2147]: time="2025-08-13T00:03:30Z" level=info msg="torcx already run" Aug 13 00:03:31.179633 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:03:31.179676 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:03:31.218840 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit: BPF prog-id=46 op=LOAD Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.382000 audit: BPF prog-id=47 op=LOAD Aug 13 00:03:31.382000 audit: BPF prog-id=27 op=UNLOAD Aug 13 00:03:31.382000 audit: BPF prog-id=28 op=UNLOAD Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.388000 audit: BPF prog-id=48 op=LOAD Aug 13 00:03:31.388000 audit: BPF prog-id=41 op=UNLOAD Aug 13 00:03:31.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit: BPF prog-id=49 op=LOAD Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.389000 audit: BPF prog-id=50 op=LOAD Aug 13 00:03:31.389000 audit: BPF prog-id=42 op=UNLOAD Aug 13 00:03:31.389000 audit: BPF prog-id=43 op=UNLOAD Aug 13 00:03:31.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.391000 audit: BPF prog-id=51 op=LOAD Aug 13 00:03:31.391000 audit: BPF prog-id=36 op=UNLOAD Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.394000 audit: BPF prog-id=52 op=LOAD Aug 13 00:03:31.394000 audit: BPF prog-id=29 op=UNLOAD Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.398000 audit: BPF prog-id=53 op=LOAD Aug 13 00:03:31.398000 audit: BPF prog-id=37 op=UNLOAD Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit: BPF prog-id=54 op=LOAD Aug 13 00:03:31.402000 audit: BPF prog-id=38 op=UNLOAD Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit: BPF prog-id=55 op=LOAD Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.402000 audit: BPF prog-id=56 op=LOAD Aug 13 00:03:31.402000 audit: BPF prog-id=39 op=UNLOAD Aug 13 00:03:31.402000 audit: BPF prog-id=40 op=UNLOAD Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.404000 audit: BPF prog-id=57 op=LOAD Aug 13 00:03:31.404000 audit: BPF prog-id=44 op=UNLOAD Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.406000 audit: BPF prog-id=58 op=LOAD Aug 13 00:03:31.406000 audit: BPF prog-id=30 op=UNLOAD Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit: BPF prog-id=59 op=LOAD Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.407000 audit: BPF prog-id=60 op=LOAD Aug 13 00:03:31.407000 audit: BPF prog-id=31 op=UNLOAD Aug 13 00:03:31.407000 audit: BPF prog-id=32 op=UNLOAD Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit: BPF prog-id=61 op=LOAD Aug 13 00:03:31.409000 audit: BPF prog-id=33 op=UNLOAD Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit: BPF prog-id=62 op=LOAD Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:31.409000 audit: BPF prog-id=63 op=LOAD Aug 13 00:03:31.409000 audit: BPF prog-id=34 op=UNLOAD Aug 13 00:03:31.409000 audit: BPF prog-id=35 op=UNLOAD Aug 13 00:03:31.455092 systemd[1]: Started kubelet.service. Aug 13 00:03:31.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:31.466592 systemd[1]: Stopping kubelet.service... Aug 13 00:03:31.469322 systemd[1]: kubelet.service: Deactivated successfully. Aug 13 00:03:31.470208 systemd[1]: Stopped kubelet.service. Aug 13 00:03:31.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:31.474313 systemd[1]: Starting kubelet.service... Aug 13 00:03:31.810812 systemd[1]: Started kubelet.service. Aug 13 00:03:31.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:31.902558 kubelet[2211]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 00:03:31.902558 kubelet[2211]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Aug 13 00:03:31.902558 kubelet[2211]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 00:03:31.903255 kubelet[2211]: I0813 00:03:31.902664 2211 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Aug 13 00:03:33.321821 kubelet[2211]: I0813 00:03:33.321766 2211 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Aug 13 00:03:33.322588 kubelet[2211]: I0813 00:03:33.322560 2211 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Aug 13 00:03:33.323164 kubelet[2211]: I0813 00:03:33.323104 2211 server.go:934] "Client rotation is on, will bootstrap in background" Aug 13 00:03:33.414319 kubelet[2211]: I0813 00:03:33.414151 2211 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Aug 13 00:03:33.433527 kubelet[2211]: E0813 00:03:33.433472 2211 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Aug 13 00:03:33.433845 kubelet[2211]: I0813 00:03:33.433822 2211 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Aug 13 00:03:33.442854 kubelet[2211]: I0813 00:03:33.442779 2211 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Aug 13 00:03:33.443655 kubelet[2211]: I0813 00:03:33.443607 2211 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Aug 13 00:03:33.443961 kubelet[2211]: I0813 00:03:33.443914 2211 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Aug 13 00:03:33.444354 kubelet[2211]: I0813 00:03:33.443965 2211 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.18.161","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Aug 13 00:03:33.444558 kubelet[2211]: I0813 00:03:33.444483 2211 topology_manager.go:138] "Creating topology manager with none policy" Aug 13 00:03:33.444558 kubelet[2211]: I0813 00:03:33.444508 2211 container_manager_linux.go:300] "Creating device plugin manager" Aug 13 00:03:33.444857 kubelet[2211]: I0813 00:03:33.444827 2211 state_mem.go:36] "Initialized new in-memory state store" Aug 13 00:03:33.453080 kubelet[2211]: I0813 00:03:33.453032 2211 kubelet.go:408] "Attempting to sync node with API server" Aug 13 00:03:33.453080 kubelet[2211]: I0813 00:03:33.453085 2211 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Aug 13 00:03:33.453371 kubelet[2211]: I0813 00:03:33.453150 2211 kubelet.go:314] "Adding apiserver pod source" Aug 13 00:03:33.453371 kubelet[2211]: I0813 00:03:33.453345 2211 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Aug 13 00:03:33.470526 kubelet[2211]: E0813 00:03:33.470468 2211 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:33.470773 kubelet[2211]: E0813 00:03:33.470551 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:33.473296 kubelet[2211]: I0813 00:03:33.473248 2211 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Aug 13 00:03:33.474863 kubelet[2211]: I0813 00:03:33.474835 2211 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Aug 13 00:03:33.475485 kubelet[2211]: W0813 00:03:33.475460 2211 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Aug 13 00:03:33.479906 kubelet[2211]: I0813 00:03:33.479858 2211 server.go:1274] "Started kubelet" Aug 13 00:03:33.484000 audit[2211]: AVC avc: denied { mac_admin } for pid=2211 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:33.484000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:03:33.484000 audit[2211]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007e69f0 a1=40007d06d8 a2=40007e69c0 a3=25 items=0 ppid=1 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.484000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:03:33.484000 audit[2211]: AVC avc: denied { mac_admin } for pid=2211 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:33.484000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:03:33.484000 audit[2211]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007c6440 a1=40007d06f0 a2=40007e6a80 a3=25 items=0 ppid=1 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.484000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:03:33.486465 kubelet[2211]: I0813 00:03:33.485576 2211 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Aug 13 00:03:33.486465 kubelet[2211]: I0813 00:03:33.485692 2211 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Aug 13 00:03:33.486465 kubelet[2211]: I0813 00:03:33.485823 2211 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Aug 13 00:03:33.492918 kubelet[2211]: I0813 00:03:33.492825 2211 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Aug 13 00:03:33.494911 kubelet[2211]: I0813 00:03:33.494855 2211 server.go:449] "Adding debug handlers to kubelet server" Aug 13 00:03:33.497022 kubelet[2211]: I0813 00:03:33.496892 2211 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Aug 13 00:03:33.497352 kubelet[2211]: I0813 00:03:33.497306 2211 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Aug 13 00:03:33.497880 kubelet[2211]: I0813 00:03:33.497834 2211 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Aug 13 00:03:33.498141 kubelet[2211]: I0813 00:03:33.498097 2211 volume_manager.go:289] "Starting Kubelet Volume Manager" Aug 13 00:03:33.503281 kubelet[2211]: I0813 00:03:33.498432 2211 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Aug 13 00:03:33.503464 kubelet[2211]: I0813 00:03:33.503393 2211 reconciler.go:26] "Reconciler: start to sync state" Aug 13 00:03:33.503464 kubelet[2211]: E0813 00:03:33.499569 2211 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.18.161\" not found" Aug 13 00:03:33.509249 kubelet[2211]: I0813 00:03:33.509212 2211 factory.go:221] Registration of the systemd container factory successfully Aug 13 00:03:33.511028 kubelet[2211]: E0813 00:03:33.510974 2211 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Aug 13 00:03:33.511341 kubelet[2211]: I0813 00:03:33.511096 2211 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Aug 13 00:03:33.535942 kubelet[2211]: I0813 00:03:33.535888 2211 factory.go:221] Registration of the containerd container factory successfully Aug 13 00:03:33.556559 kubelet[2211]: E0813 00:03:33.556494 2211 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.18.161\" not found" node="172.31.18.161" Aug 13 00:03:33.580252 kubelet[2211]: I0813 00:03:33.580102 2211 cpu_manager.go:214] "Starting CPU manager" policy="none" Aug 13 00:03:33.580252 kubelet[2211]: I0813 00:03:33.580149 2211 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Aug 13 00:03:33.580252 kubelet[2211]: I0813 00:03:33.580188 2211 state_mem.go:36] "Initialized new in-memory state store" Aug 13 00:03:33.585982 kubelet[2211]: I0813 00:03:33.585924 2211 policy_none.go:49] "None policy: Start" Aug 13 00:03:33.587417 kubelet[2211]: I0813 00:03:33.587325 2211 memory_manager.go:170] "Starting memorymanager" policy="None" Aug 13 00:03:33.587417 kubelet[2211]: I0813 00:03:33.587427 2211 state_mem.go:35] "Initializing new in-memory state store" Aug 13 00:03:33.592000 audit[2227]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.592000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc46e05d0 a2=0 a3=1 items=0 ppid=2211 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 00:03:33.596000 audit[2230]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.596000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc4078d90 a2=0 a3=1 items=0 ppid=2211 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 00:03:33.598332 systemd[1]: Created slice kubepods.slice. Aug 13 00:03:33.610786 kubelet[2211]: E0813 00:03:33.610738 2211 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.18.161\" not found" Aug 13 00:03:33.621603 systemd[1]: Created slice kubepods-burstable.slice. Aug 13 00:03:33.629310 systemd[1]: Created slice kubepods-besteffort.slice. Aug 13 00:03:33.641052 kubelet[2211]: I0813 00:03:33.640998 2211 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Aug 13 00:03:33.639000 audit[2211]: AVC avc: denied { mac_admin } for pid=2211 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:33.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:03:33.639000 audit[2211]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000976b10 a1=40007d0e88 a2=4000976ae0 a3=25 items=0 ppid=1 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:03:33.641575 kubelet[2211]: I0813 00:03:33.641228 2211 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Aug 13 00:03:33.641575 kubelet[2211]: I0813 00:03:33.641525 2211 eviction_manager.go:189] "Eviction manager: starting control loop" Aug 13 00:03:33.641701 kubelet[2211]: I0813 00:03:33.641547 2211 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Aug 13 00:03:33.647487 kubelet[2211]: I0813 00:03:33.644037 2211 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Aug 13 00:03:33.648899 kubelet[2211]: E0813 00:03:33.648861 2211 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.18.161\" not found" Aug 13 00:03:33.603000 audit[2232]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.603000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe73c36f0 a2=0 a3=1 items=0 ppid=2211 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:03:33.655000 audit[2238]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.655000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe89257b0 a2=0 a3=1 items=0 ppid=2211 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:03:33.743772 kubelet[2211]: I0813 00:03:33.743724 2211 kubelet_node_status.go:72] "Attempting to register node" node="172.31.18.161" Aug 13 00:03:33.758062 kubelet[2211]: I0813 00:03:33.758022 2211 kubelet_node_status.go:75] "Successfully registered node" node="172.31.18.161" Aug 13 00:03:33.758336 kubelet[2211]: E0813 00:03:33.758308 2211 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"172.31.18.161\": node \"172.31.18.161\" not found" Aug 13 00:03:33.800000 audit[2243]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.800000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff3e1fc80 a2=0 a3=1 items=0 ppid=2211 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Aug 13 00:03:33.802236 kubelet[2211]: I0813 00:03:33.802111 2211 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Aug 13 00:03:33.802000 audit[2244]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:33.802000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd12090b0 a2=0 a3=1 items=0 ppid=2211 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 00:03:33.804774 kubelet[2211]: I0813 00:03:33.804713 2211 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Aug 13 00:03:33.804893 kubelet[2211]: I0813 00:03:33.804783 2211 status_manager.go:217] "Starting to sync pod status with apiserver" Aug 13 00:03:33.804893 kubelet[2211]: I0813 00:03:33.804823 2211 kubelet.go:2321] "Starting kubelet main sync loop" Aug 13 00:03:33.805008 kubelet[2211]: E0813 00:03:33.804971 2211 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Aug 13 00:03:33.805000 audit[2245]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.805000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde2446d0 a2=0 a3=1 items=0 ppid=2211 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 00:03:33.808000 audit[2247]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.808000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdd5c7f60 a2=0 a3=1 items=0 ppid=2211 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 00:03:33.808000 audit[2246]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:33.808000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdac1e4e0 a2=0 a3=1 items=0 ppid=2211 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 00:03:33.811000 audit[2248]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:33.811000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc09ed700 a2=0 a3=1 items=0 ppid=2211 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 00:03:33.812000 audit[2249]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:33.812000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd9111c70 a2=0 a3=1 items=0 ppid=2211 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 00:03:33.814000 audit[2250]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:33.814000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdca9a760 a2=0 a3=1 items=0 ppid=2211 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:33.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 00:03:33.816928 kubelet[2211]: I0813 00:03:33.816888 2211 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Aug 13 00:03:33.817683 env[1812]: time="2025-08-13T00:03:33.817614606Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Aug 13 00:03:33.818301 kubelet[2211]: I0813 00:03:33.818003 2211 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Aug 13 00:03:33.950812 sudo[2086]: pam_unix(sudo:session): session closed for user root Aug 13 00:03:33.950000 audit[2086]: USER_END pid=2086 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:33.950000 audit[2086]: CRED_DISP pid=2086 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:03:33.976533 sshd[2083]: pam_unix(sshd:session): session closed for user core Aug 13 00:03:33.979000 audit[2083]: USER_END pid=2083 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:33.981745 kernel: kauditd_printk_skb: 273 callbacks suppressed Aug 13 00:03:33.981891 kernel: audit: type=1106 audit(1755043413.979:445): pid=2083 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:33.982791 systemd[1]: session-7.scope: Deactivated successfully. Aug 13 00:03:33.984456 systemd[1]: sshd@6-172.31.18.161:22-139.178.89.65:47248.service: Deactivated successfully. Aug 13 00:03:33.979000 audit[2083]: CRED_DISP pid=2083 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:34.002951 kernel: audit: type=1104 audit(1755043413.979:446): pid=2083 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Aug 13 00:03:34.003007 systemd-logind[1806]: Session 7 logged out. Waiting for processes to exit. Aug 13 00:03:33.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.161:22-139.178.89.65:47248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:34.012926 kernel: audit: type=1131 audit(1755043413.983:447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.161:22-139.178.89.65:47248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:34.013594 systemd-logind[1806]: Removed session 7. Aug 13 00:03:34.327183 kubelet[2211]: I0813 00:03:34.327020 2211 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Aug 13 00:03:34.328101 kubelet[2211]: W0813 00:03:34.328072 2211 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Aug 13 00:03:34.328393 kubelet[2211]: W0813 00:03:34.328095 2211 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Aug 13 00:03:34.328799 kubelet[2211]: W0813 00:03:34.328170 2211 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Aug 13 00:03:34.471196 kubelet[2211]: I0813 00:03:34.471160 2211 apiserver.go:52] "Watching apiserver" Aug 13 00:03:34.471480 kubelet[2211]: E0813 00:03:34.471163 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:34.483252 kubelet[2211]: E0813 00:03:34.483184 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-km7tf" podUID="440eed8a-c20b-4a0b-89d3-7187a51dc10f" Aug 13 00:03:34.493216 systemd[1]: Created slice kubepods-besteffort-pod032596e1_49f8_4058_9436_b8f4095578e8.slice. Aug 13 00:03:34.506088 kubelet[2211]: I0813 00:03:34.506031 2211 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Aug 13 00:03:34.511243 systemd[1]: Created slice kubepods-besteffort-podb35181eb_ee19_41fe_8860_e9c995a23fca.slice. Aug 13 00:03:34.516866 kubelet[2211]: I0813 00:03:34.516589 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-policysync\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.516866 kubelet[2211]: I0813 00:03:34.516669 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b35181eb-ee19-41fe-8860-e9c995a23fca-tigera-ca-bundle\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.516866 kubelet[2211]: I0813 00:03:34.516709 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/440eed8a-c20b-4a0b-89d3-7187a51dc10f-kubelet-dir\") pod \"csi-node-driver-km7tf\" (UID: \"440eed8a-c20b-4a0b-89d3-7187a51dc10f\") " pod="calico-system/csi-node-driver-km7tf" Aug 13 00:03:34.516866 kubelet[2211]: I0813 00:03:34.516748 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tcppb\" (UniqueName: \"kubernetes.io/projected/440eed8a-c20b-4a0b-89d3-7187a51dc10f-kube-api-access-tcppb\") pod \"csi-node-driver-km7tf\" (UID: \"440eed8a-c20b-4a0b-89d3-7187a51dc10f\") " pod="calico-system/csi-node-driver-km7tf" Aug 13 00:03:34.516866 kubelet[2211]: I0813 00:03:34.516803 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/032596e1-49f8-4058-9436-b8f4095578e8-lib-modules\") pod \"kube-proxy-97kj5\" (UID: \"032596e1-49f8-4058-9436-b8f4095578e8\") " pod="kube-system/kube-proxy-97kj5" Aug 13 00:03:34.517308 kubelet[2211]: I0813 00:03:34.516844 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-cni-bin-dir\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517308 kubelet[2211]: I0813 00:03:34.516885 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-flexvol-driver-host\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517308 kubelet[2211]: I0813 00:03:34.516924 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-xtables-lock\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517308 kubelet[2211]: I0813 00:03:34.516960 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6psw7\" (UniqueName: \"kubernetes.io/projected/b35181eb-ee19-41fe-8860-e9c995a23fca-kube-api-access-6psw7\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517308 kubelet[2211]: I0813 00:03:34.516995 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/440eed8a-c20b-4a0b-89d3-7187a51dc10f-registration-dir\") pod \"csi-node-driver-km7tf\" (UID: \"440eed8a-c20b-4a0b-89d3-7187a51dc10f\") " pod="calico-system/csi-node-driver-km7tf" Aug 13 00:03:34.517615 kubelet[2211]: I0813 00:03:34.517038 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/440eed8a-c20b-4a0b-89d3-7187a51dc10f-socket-dir\") pod \"csi-node-driver-km7tf\" (UID: \"440eed8a-c20b-4a0b-89d3-7187a51dc10f\") " pod="calico-system/csi-node-driver-km7tf" Aug 13 00:03:34.517615 kubelet[2211]: I0813 00:03:34.517076 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/032596e1-49f8-4058-9436-b8f4095578e8-kube-proxy\") pod \"kube-proxy-97kj5\" (UID: \"032596e1-49f8-4058-9436-b8f4095578e8\") " pod="kube-system/kube-proxy-97kj5" Aug 13 00:03:34.517615 kubelet[2211]: I0813 00:03:34.517111 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-lib-modules\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517615 kubelet[2211]: I0813 00:03:34.517174 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b35181eb-ee19-41fe-8860-e9c995a23fca-node-certs\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517615 kubelet[2211]: I0813 00:03:34.517212 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-var-run-calico\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517918 kubelet[2211]: I0813 00:03:34.517258 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/440eed8a-c20b-4a0b-89d3-7187a51dc10f-varrun\") pod \"csi-node-driver-km7tf\" (UID: \"440eed8a-c20b-4a0b-89d3-7187a51dc10f\") " pod="calico-system/csi-node-driver-km7tf" Aug 13 00:03:34.517918 kubelet[2211]: I0813 00:03:34.517293 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/032596e1-49f8-4058-9436-b8f4095578e8-xtables-lock\") pod \"kube-proxy-97kj5\" (UID: \"032596e1-49f8-4058-9436-b8f4095578e8\") " pod="kube-system/kube-proxy-97kj5" Aug 13 00:03:34.517918 kubelet[2211]: I0813 00:03:34.517339 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-cni-log-dir\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.517918 kubelet[2211]: I0813 00:03:34.517375 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2wj4t\" (UniqueName: \"kubernetes.io/projected/032596e1-49f8-4058-9436-b8f4095578e8-kube-api-access-2wj4t\") pod \"kube-proxy-97kj5\" (UID: \"032596e1-49f8-4058-9436-b8f4095578e8\") " pod="kube-system/kube-proxy-97kj5" Aug 13 00:03:34.517918 kubelet[2211]: I0813 00:03:34.517410 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-cni-net-dir\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.518550 kubelet[2211]: I0813 00:03:34.517445 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b35181eb-ee19-41fe-8860-e9c995a23fca-var-lib-calico\") pod \"calico-node-7zv29\" (UID: \"b35181eb-ee19-41fe-8860-e9c995a23fca\") " pod="calico-system/calico-node-7zv29" Aug 13 00:03:34.620584 kubelet[2211]: I0813 00:03:34.620441 2211 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Aug 13 00:03:34.623866 kubelet[2211]: E0813 00:03:34.623787 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.623866 kubelet[2211]: W0813 00:03:34.623849 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.624081 kubelet[2211]: E0813 00:03:34.623918 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.625226 kubelet[2211]: E0813 00:03:34.625186 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.625365 kubelet[2211]: W0813 00:03:34.625247 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.625365 kubelet[2211]: E0813 00:03:34.625283 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.627510 kubelet[2211]: E0813 00:03:34.627456 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.627510 kubelet[2211]: W0813 00:03:34.627495 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.627707 kubelet[2211]: E0813 00:03:34.627528 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.629498 kubelet[2211]: E0813 00:03:34.629442 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.629498 kubelet[2211]: W0813 00:03:34.629483 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.629752 kubelet[2211]: E0813 00:03:34.629516 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.639245 kubelet[2211]: E0813 00:03:34.639194 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.639245 kubelet[2211]: W0813 00:03:34.639232 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.639470 kubelet[2211]: E0813 00:03:34.639264 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.641139 kubelet[2211]: E0813 00:03:34.641080 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.641139 kubelet[2211]: W0813 00:03:34.641115 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.641386 kubelet[2211]: E0813 00:03:34.641180 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.710691 kubelet[2211]: E0813 00:03:34.710649 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.710881 kubelet[2211]: W0813 00:03:34.710850 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.711048 kubelet[2211]: E0813 00:03:34.711020 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.726707 kubelet[2211]: E0813 00:03:34.722580 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.726707 kubelet[2211]: W0813 00:03:34.722620 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.726707 kubelet[2211]: E0813 00:03:34.722670 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.726707 kubelet[2211]: E0813 00:03:34.723068 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.726707 kubelet[2211]: W0813 00:03:34.723087 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.726707 kubelet[2211]: E0813 00:03:34.723109 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.728431 kubelet[2211]: E0813 00:03:34.728378 2211 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:03:34.728431 kubelet[2211]: W0813 00:03:34.728415 2211 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:03:34.728620 kubelet[2211]: E0813 00:03:34.728448 2211 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:03:34.803993 env[1812]: time="2025-08-13T00:03:34.803491250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-97kj5,Uid:032596e1-49f8-4058-9436-b8f4095578e8,Namespace:kube-system,Attempt:0,}" Aug 13 00:03:34.824966 env[1812]: time="2025-08-13T00:03:34.824887249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7zv29,Uid:b35181eb-ee19-41fe-8860-e9c995a23fca,Namespace:calico-system,Attempt:0,}" Aug 13 00:03:35.331944 env[1812]: time="2025-08-13T00:03:35.331857756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.336565 env[1812]: time="2025-08-13T00:03:35.336496168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.338002 env[1812]: time="2025-08-13T00:03:35.337949028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.339824 env[1812]: time="2025-08-13T00:03:35.339776681Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.343830 env[1812]: time="2025-08-13T00:03:35.343774985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.348243 env[1812]: time="2025-08-13T00:03:35.348177219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.352880 env[1812]: time="2025-08-13T00:03:35.352815498Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.354393 env[1812]: time="2025-08-13T00:03:35.354321194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:35.391647 env[1812]: time="2025-08-13T00:03:35.391506499Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:03:35.391860 env[1812]: time="2025-08-13T00:03:35.391590688Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:03:35.391860 env[1812]: time="2025-08-13T00:03:35.391618076Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:03:35.392743 env[1812]: time="2025-08-13T00:03:35.392610386Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:03:35.392917 env[1812]: time="2025-08-13T00:03:35.392695057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:03:35.392917 env[1812]: time="2025-08-13T00:03:35.392722457Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:03:35.393179 env[1812]: time="2025-08-13T00:03:35.392967552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/846f81413da636a5e932d833d55fc8a7d97d73c0268f12e729c76c0f799022d2 pid=2283 runtime=io.containerd.runc.v2 Aug 13 00:03:35.393661 env[1812]: time="2025-08-13T00:03:35.393573561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580 pid=2284 runtime=io.containerd.runc.v2 Aug 13 00:03:35.433748 systemd[1]: Started cri-containerd-952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580.scope. Aug 13 00:03:35.452394 systemd[1]: Started cri-containerd-846f81413da636a5e932d833d55fc8a7d97d73c0268f12e729c76c0f799022d2.scope. Aug 13 00:03:35.471795 kubelet[2211]: E0813 00:03:35.471677 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502680 kernel: audit: type=1400 audit(1755043415.485:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502890 kernel: audit: type=1400 audit(1755043415.485:449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.515183 kernel: audit: type=1400 audit(1755043415.485:450): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.528259 kernel: audit: type=1400 audit(1755043415.485:451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.538642 kernel: audit: type=1400 audit(1755043415.485:452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.547375 kernel: audit: type=1400 audit(1755043415.485:453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.556005 kernel: audit: type=1400 audit(1755043415.485:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557658 env[1812]: time="2025-08-13T00:03:35.557589387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7zv29,Uid:b35181eb-ee19-41fe-8860-e9c995a23fca,Namespace:calico-system,Attempt:0,} returns sandbox id \"952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580\"" Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.485000 audit: BPF prog-id=64 op=LOAD Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2284 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:35.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323030306666646266616161326634363237376463643434343638 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2284 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:35.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323030306666646266616161326634363237376463643434343638 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.486000 audit: BPF prog-id=65 op=LOAD Aug 13 00:03:35.486000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2284 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:35.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323030306666646266616161326634363237376463643434343638 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.494000 audit: BPF prog-id=66 op=LOAD Aug 13 00:03:35.494000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2284 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:35.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323030306666646266616161326634363237376463643434343638 Aug 13 00:03:35.501000 audit: BPF prog-id=66 op=UNLOAD Aug 13 00:03:35.502000 audit: BPF prog-id=65 op=UNLOAD Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.502000 audit: BPF prog-id=67 op=LOAD Aug 13 00:03:35.502000 audit[2304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2284 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:35.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323030306666646266616161326634363237376463643434343638 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:35.563000 audit: BPF prog-id=71 op=LOAD Aug 13 00:03:35.563000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2283 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:35.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834366638313431336461363336613565393332643833336435356663 Aug 13 00:03:35.566899 env[1812]: time="2025-08-13T00:03:35.566845619Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Aug 13 00:03:35.595097 env[1812]: time="2025-08-13T00:03:35.594905800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-97kj5,Uid:032596e1-49f8-4058-9436-b8f4095578e8,Namespace:kube-system,Attempt:0,} returns sandbox id \"846f81413da636a5e932d833d55fc8a7d97d73c0268f12e729c76c0f799022d2\"" Aug 13 00:03:35.639892 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount864162715.mount: Deactivated successfully. Aug 13 00:03:36.472976 kubelet[2211]: E0813 00:03:36.472873 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:36.627853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1784279135.mount: Deactivated successfully. Aug 13 00:03:36.799925 env[1812]: time="2025-08-13T00:03:36.799444395Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:36.803184 env[1812]: time="2025-08-13T00:03:36.803079106Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:36.806699 kubelet[2211]: E0813 00:03:36.806171 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-km7tf" podUID="440eed8a-c20b-4a0b-89d3-7187a51dc10f" Aug 13 00:03:36.807147 env[1812]: time="2025-08-13T00:03:36.807056155Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:36.810188 env[1812]: time="2025-08-13T00:03:36.810082673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:36.811866 env[1812]: time="2025-08-13T00:03:36.811796222Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f\"" Aug 13 00:03:36.814871 env[1812]: time="2025-08-13T00:03:36.814814106Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.11\"" Aug 13 00:03:36.819681 env[1812]: time="2025-08-13T00:03:36.819621278Z" level=info msg="CreateContainer within sandbox \"952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Aug 13 00:03:36.845832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1514739187.mount: Deactivated successfully. Aug 13 00:03:36.851801 env[1812]: time="2025-08-13T00:03:36.851665008Z" level=info msg="CreateContainer within sandbox \"952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d\"" Aug 13 00:03:36.853205 env[1812]: time="2025-08-13T00:03:36.853149424Z" level=info msg="StartContainer for \"7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d\"" Aug 13 00:03:36.901877 systemd[1]: Started cri-containerd-7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d.scope. Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2284 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:36.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393331646138656537626538316361396565626432306665303237 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.957000 audit: BPF prog-id=72 op=LOAD Aug 13 00:03:36.957000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2284 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:36.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393331646138656537626538316361396565626432306665303237 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit: BPF prog-id=73 op=LOAD Aug 13 00:03:36.958000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2284 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:36.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393331646138656537626538316361396565626432306665303237 Aug 13 00:03:36.958000 audit: BPF prog-id=73 op=UNLOAD Aug 13 00:03:36.958000 audit: BPF prog-id=72 op=UNLOAD Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:36.958000 audit: BPF prog-id=74 op=LOAD Aug 13 00:03:36.958000 audit[2361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2284 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:36.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393331646138656537626538316361396565626432306665303237 Aug 13 00:03:36.985321 env[1812]: time="2025-08-13T00:03:36.985256776Z" level=info msg="StartContainer for \"7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d\" returns successfully" Aug 13 00:03:37.015230 systemd[1]: cri-containerd-7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d.scope: Deactivated successfully. Aug 13 00:03:37.018000 audit: BPF prog-id=74 op=UNLOAD Aug 13 00:03:37.090659 env[1812]: time="2025-08-13T00:03:37.090494167Z" level=info msg="shim disconnected" id=7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d Aug 13 00:03:37.090659 env[1812]: time="2025-08-13T00:03:37.090568958Z" level=warning msg="cleaning up after shim disconnected" id=7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d namespace=k8s.io Aug 13 00:03:37.090659 env[1812]: time="2025-08-13T00:03:37.090595164Z" level=info msg="cleaning up dead shim" Aug 13 00:03:37.106506 env[1812]: time="2025-08-13T00:03:37.106445964Z" level=warning msg="cleanup warnings time=\"2025-08-13T00:03:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2400 runtime=io.containerd.runc.v2\n" Aug 13 00:03:37.473224 kubelet[2211]: E0813 00:03:37.473053 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:37.837210 systemd[1]: run-containerd-runc-k8s.io-7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d-runc.jESGvU.mount: Deactivated successfully. Aug 13 00:03:37.837387 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7f931da8ee7be81ca9eebd20fe027318eea8975a2e79949516b8d26d1921913d-rootfs.mount: Deactivated successfully. Aug 13 00:03:38.234682 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2906772710.mount: Deactivated successfully. Aug 13 00:03:38.474018 kubelet[2211]: E0813 00:03:38.473954 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:38.805485 kubelet[2211]: E0813 00:03:38.805400 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-km7tf" podUID="440eed8a-c20b-4a0b-89d3-7187a51dc10f" Aug 13 00:03:39.122786 env[1812]: time="2025-08-13T00:03:39.122616642Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:39.125835 env[1812]: time="2025-08-13T00:03:39.125767580Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d1e7db6660181423f98acbe3a495b3fe5cec9b85cdef245540cc2cb3b180ab0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:39.128501 env[1812]: time="2025-08-13T00:03:39.128437674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:39.130967 env[1812]: time="2025-08-13T00:03:39.130904095Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a31da847792c5e7e92e91b78da1ad21d693e4b2b48d0e9f4610c8764dc2a5d79,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:39.131943 env[1812]: time="2025-08-13T00:03:39.131894219Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.11\" returns image reference \"sha256:7d1e7db6660181423f98acbe3a495b3fe5cec9b85cdef245540cc2cb3b180ab0\"" Aug 13 00:03:39.135103 env[1812]: time="2025-08-13T00:03:39.135050894Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Aug 13 00:03:39.136420 env[1812]: time="2025-08-13T00:03:39.136357307Z" level=info msg="CreateContainer within sandbox \"846f81413da636a5e932d833d55fc8a7d97d73c0268f12e729c76c0f799022d2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Aug 13 00:03:39.160263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3617513577.mount: Deactivated successfully. Aug 13 00:03:39.171468 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2023288558.mount: Deactivated successfully. Aug 13 00:03:39.178311 env[1812]: time="2025-08-13T00:03:39.178248806Z" level=info msg="CreateContainer within sandbox \"846f81413da636a5e932d833d55fc8a7d97d73c0268f12e729c76c0f799022d2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2aeb172c34126854d6432611256fb97276d798f69dd5ed1413ccb9c9575b5f2c\"" Aug 13 00:03:39.179750 env[1812]: time="2025-08-13T00:03:39.179584461Z" level=info msg="StartContainer for \"2aeb172c34126854d6432611256fb97276d798f69dd5ed1413ccb9c9575b5f2c\"" Aug 13 00:03:39.212396 systemd[1]: Started cri-containerd-2aeb172c34126854d6432611256fb97276d798f69dd5ed1413ccb9c9575b5f2c.scope. Aug 13 00:03:39.259000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.262173 kernel: kauditd_printk_skb: 195 callbacks suppressed Aug 13 00:03:39.262285 kernel: audit: type=1400 audit(1755043419.259:484): avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.259000 audit[2428]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2283 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261656231373263333431323638353464363433323631313235366662 Aug 13 00:03:39.296463 kernel: audit: type=1300 audit(1755043419.259:484): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2283 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.296613 kernel: audit: type=1327 audit(1755043419.259:484): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261656231373263333431323638353464363433323631313235366662 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.304443 kernel: audit: type=1400 audit(1755043419.269:485): avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.312549 kernel: audit: type=1400 audit(1755043419.269:485): avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.322524 kernel: audit: type=1400 audit(1755043419.269:485): avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.322682 kernel: audit: type=1400 audit(1755043419.269:485): avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.338388 kernel: audit: type=1400 audit(1755043419.269:485): avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.345443 kernel: audit: type=1400 audit(1755043419.269:485): avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.355081 kernel: audit: type=1400 audit(1755043419.269:485): avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.269000 audit[2428]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-11 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2283 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261656231373263333431323638353464363433323631313235366662 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit: BPF prog-id=75 op=LOAD Aug 13 00:03:39.270000 audit[2428]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2283 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261656231373263333431323638353464363433323631313235366662 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit: BPF prog-id=76 op=LOAD Aug 13 00:03:39.270000 audit[2428]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2283 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261656231373263333431323638353464363433323631313235366662 Aug 13 00:03:39.270000 audit: BPF prog-id=76 op=UNLOAD Aug 13 00:03:39.270000 audit: BPF prog-id=75 op=UNLOAD Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:39.270000 audit: BPF prog-id=77 op=LOAD Aug 13 00:03:39.270000 audit[2428]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2283 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261656231373263333431323638353464363433323631313235366662 Aug 13 00:03:39.358674 env[1812]: time="2025-08-13T00:03:39.357084850Z" level=info msg="StartContainer for \"2aeb172c34126854d6432611256fb97276d798f69dd5ed1413ccb9c9575b5f2c\" returns successfully" Aug 13 00:03:39.478399 kubelet[2211]: E0813 00:03:39.474921 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:39.614000 audit[2489]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.614000 audit[2489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffe44bda0 a2=0 a3=1 items=0 ppid=2439 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 00:03:39.614000 audit[2490]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.614000 audit[2490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca5e6740 a2=0 a3=1 items=0 ppid=2439 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 00:03:39.616000 audit[2491]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.616000 audit[2491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8ee2940 a2=0 a3=1 items=0 ppid=2439 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 00:03:39.617000 audit[2492]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.617000 audit[2492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8e44e20 a2=0 a3=1 items=0 ppid=2439 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 00:03:39.618000 audit[2493]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.618000 audit[2493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9646d30 a2=0 a3=1 items=0 ppid=2439 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 00:03:39.622000 audit[2494]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.622000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffefefa4b0 a2=0 a3=1 items=0 ppid=2439 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 00:03:39.726000 audit[2495]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.726000 audit[2495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe3871cd0 a2=0 a3=1 items=0 ppid=2439 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 00:03:39.731000 audit[2497]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.731000 audit[2497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc795f110 a2=0 a3=1 items=0 ppid=2439 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Aug 13 00:03:39.740000 audit[2500]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.740000 audit[2500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcabede00 a2=0 a3=1 items=0 ppid=2439 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Aug 13 00:03:39.742000 audit[2501]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.742000 audit[2501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1ff2220 a2=0 a3=1 items=0 ppid=2439 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 00:03:39.748000 audit[2503]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2503 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.748000 audit[2503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff21882e0 a2=0 a3=1 items=0 ppid=2439 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 00:03:39.750000 audit[2504]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.750000 audit[2504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc876b2b0 a2=0 a3=1 items=0 ppid=2439 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 00:03:39.756000 audit[2506]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.756000 audit[2506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff4ec0dc0 a2=0 a3=1 items=0 ppid=2439 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 00:03:39.763000 audit[2509]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2509 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.763000 audit[2509]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff06d82a0 a2=0 a3=1 items=0 ppid=2439 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Aug 13 00:03:39.765000 audit[2510]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.765000 audit[2510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0a79f60 a2=0 a3=1 items=0 ppid=2439 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 00:03:39.770000 audit[2512]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.770000 audit[2512]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe2a7a0c0 a2=0 a3=1 items=0 ppid=2439 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 00:03:39.773000 audit[2513]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.773000 audit[2513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe05ec7e0 a2=0 a3=1 items=0 ppid=2439 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 00:03:39.779000 audit[2515]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.779000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9066a80 a2=0 a3=1 items=0 ppid=2439 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:03:39.786000 audit[2518]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2518 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.786000 audit[2518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff57439f0 a2=0 a3=1 items=0 ppid=2439 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:03:39.793000 audit[2521]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.793000 audit[2521]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec37d370 a2=0 a3=1 items=0 ppid=2439 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 00:03:39.795000 audit[2522]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.795000 audit[2522]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff77517f0 a2=0 a3=1 items=0 ppid=2439 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 00:03:39.803000 audit[2524]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2524 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.803000 audit[2524]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe8d38c30 a2=0 a3=1 items=0 ppid=2439 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:03:39.837000 audit[2528]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.837000 audit[2528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffee8b7f00 a2=0 a3=1 items=0 ppid=2439 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:03:39.841000 audit[2529]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.841000 audit[2529]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd655f270 a2=0 a3=1 items=0 ppid=2439 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 00:03:39.848000 audit[2531]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:03:39.848000 audit[2531]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffea085da0 a2=0 a3=1 items=0 ppid=2439 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 00:03:39.892000 audit[2537]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:39.892000 audit[2537]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe534eb70 a2=0 a3=1 items=0 ppid=2439 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:39.929000 audit[2537]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:39.929000 audit[2537]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29052 a0=3 a1=ffffe534eb70 a2=0 a3=1 items=0 ppid=2439 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:39.963000 audit[2547]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2547 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.963000 audit[2547]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff2986c40 a2=0 a3=1 items=0 ppid=2439 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 00:03:39.967000 audit[2549]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2549 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.967000 audit[2549]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe6e53c80 a2=0 a3=1 items=0 ppid=2439 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Aug 13 00:03:39.979000 audit[2552]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2552 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.979000 audit[2552]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffde45c5c0 a2=0 a3=1 items=0 ppid=2439 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Aug 13 00:03:39.981000 audit[2553]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2553 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.981000 audit[2553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4651da0 a2=0 a3=1 items=0 ppid=2439 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 00:03:39.987000 audit[2555]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2555 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.987000 audit[2555]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe627a690 a2=0 a3=1 items=0 ppid=2439 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 00:03:39.991000 audit[2556]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2556 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.991000 audit[2556]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe611c30 a2=0 a3=1 items=0 ppid=2439 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 00:03:39.999000 audit[2558]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2558 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:39.999000 audit[2558]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffc74a480 a2=0 a3=1 items=0 ppid=2439 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:39.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Aug 13 00:03:40.009000 audit[2561]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2561 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.009000 audit[2561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe6ff72d0 a2=0 a3=1 items=0 ppid=2439 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 00:03:40.011000 audit[2562]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2562 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.011000 audit[2562]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4b4a2a0 a2=0 a3=1 items=0 ppid=2439 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 00:03:40.019000 audit[2564]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2564 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.019000 audit[2564]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd2e0d7d0 a2=0 a3=1 items=0 ppid=2439 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 00:03:40.021000 audit[2565]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2565 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.021000 audit[2565]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5e584c0 a2=0 a3=1 items=0 ppid=2439 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 00:03:40.026000 audit[2567]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2567 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.026000 audit[2567]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd6a2c860 a2=0 a3=1 items=0 ppid=2439 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:03:40.033000 audit[2570]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.033000 audit[2570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff3698310 a2=0 a3=1 items=0 ppid=2439 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 00:03:40.041000 audit[2573]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2573 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.041000 audit[2573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff467cbf0 a2=0 a3=1 items=0 ppid=2439 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Aug 13 00:03:40.043000 audit[2574]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.043000 audit[2574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffecb85480 a2=0 a3=1 items=0 ppid=2439 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 00:03:40.048000 audit[2576]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.048000 audit[2576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd8af1530 a2=0 a3=1 items=0 ppid=2439 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:03:40.055000 audit[2579]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2579 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.055000 audit[2579]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd8f7ddd0 a2=0 a3=1 items=0 ppid=2439 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:03:40.058000 audit[2580]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2580 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.058000 audit[2580]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffda4e470 a2=0 a3=1 items=0 ppid=2439 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 00:03:40.064000 audit[2582]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2582 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.064000 audit[2582]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc2f0c8d0 a2=0 a3=1 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 00:03:40.067000 audit[2583]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2583 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.067000 audit[2583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdea78890 a2=0 a3=1 items=0 ppid=2439 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 00:03:40.072000 audit[2585]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.072000 audit[2585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd984cb00 a2=0 a3=1 items=0 ppid=2439 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:03:40.079000 audit[2588]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2588 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:03:40.079000 audit[2588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffff33bdf0 a2=0 a3=1 items=0 ppid=2439 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:03:40.086000 audit[2590]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 00:03:40.086000 audit[2590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffff1a09930 a2=0 a3=1 items=0 ppid=2439 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.086000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:40.087000 audit[2590]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 00:03:40.087000 audit[2590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff1a09930 a2=0 a3=1 items=0 ppid=2439 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:40.087000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:40.475298 kubelet[2211]: E0813 00:03:40.475116 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:40.805786 kubelet[2211]: E0813 00:03:40.805154 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-km7tf" podUID="440eed8a-c20b-4a0b-89d3-7187a51dc10f" Aug 13 00:03:41.475344 kubelet[2211]: E0813 00:03:41.475277 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:42.476157 kubelet[2211]: E0813 00:03:42.475927 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:42.706607 env[1812]: time="2025-08-13T00:03:42.706520532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:42.710286 env[1812]: time="2025-08-13T00:03:42.710214986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:42.713392 env[1812]: time="2025-08-13T00:03:42.713328183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:42.716079 env[1812]: time="2025-08-13T00:03:42.716026592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:42.717156 env[1812]: time="2025-08-13T00:03:42.717086015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588\"" Aug 13 00:03:42.722038 env[1812]: time="2025-08-13T00:03:42.721956732Z" level=info msg="CreateContainer within sandbox \"952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Aug 13 00:03:42.745002 env[1812]: time="2025-08-13T00:03:42.744844666Z" level=info msg="CreateContainer within sandbox \"952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a\"" Aug 13 00:03:42.746890 env[1812]: time="2025-08-13T00:03:42.746836336Z" level=info msg="StartContainer for \"3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a\"" Aug 13 00:03:42.789217 systemd[1]: run-containerd-runc-k8s.io-3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a-runc.szwXKG.mount: Deactivated successfully. Aug 13 00:03:42.799425 systemd[1]: Started cri-containerd-3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a.scope. Aug 13 00:03:42.809437 kubelet[2211]: E0813 00:03:42.809355 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-km7tf" podUID="440eed8a-c20b-4a0b-89d3-7187a51dc10f" Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2284 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:42.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303365626565303266366663616138393130383733643735636131 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit: BPF prog-id=78 op=LOAD Aug 13 00:03:42.852000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2284 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:42.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303365626565303266366663616138393130383733643735636131 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.852000 audit: BPF prog-id=79 op=LOAD Aug 13 00:03:42.852000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2284 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:42.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303365626565303266366663616138393130383733643735636131 Aug 13 00:03:42.853000 audit: BPF prog-id=79 op=UNLOAD Aug 13 00:03:42.853000 audit: BPF prog-id=78 op=UNLOAD Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:42.853000 audit: BPF prog-id=80 op=LOAD Aug 13 00:03:42.853000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2284 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:42.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303365626565303266366663616138393130383733643735636131 Aug 13 00:03:42.894346 env[1812]: time="2025-08-13T00:03:42.894087275Z" level=info msg="StartContainer for \"3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a\" returns successfully" Aug 13 00:03:43.477079 kubelet[2211]: E0813 00:03:43.477035 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:43.885243 kubelet[2211]: I0813 00:03:43.884994 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-97kj5" podStartSLOduration=7.351633967 podStartE2EDuration="10.884972986s" podCreationTimestamp="2025-08-13 00:03:33 +0000 UTC" firstStartedPulling="2025-08-13 00:03:35.600469757 +0000 UTC m=+3.779451450" lastFinishedPulling="2025-08-13 00:03:39.133808801 +0000 UTC m=+7.312790469" observedRunningTime="2025-08-13 00:03:39.8702623 +0000 UTC m=+8.049244016" watchObservedRunningTime="2025-08-13 00:03:43.884972986 +0000 UTC m=+12.063954666" Aug 13 00:03:44.045222 env[1812]: time="2025-08-13T00:03:44.045145345Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 00:03:44.050567 systemd[1]: cri-containerd-3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a.scope: Deactivated successfully. Aug 13 00:03:44.051090 systemd[1]: cri-containerd-3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a.scope: Consumed 1.095s CPU time. Aug 13 00:03:44.055000 audit: BPF prog-id=80 op=UNLOAD Aug 13 00:03:44.087538 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a-rootfs.mount: Deactivated successfully. Aug 13 00:03:44.108484 kubelet[2211]: I0813 00:03:44.108245 2211 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Aug 13 00:03:44.478612 kubelet[2211]: E0813 00:03:44.478537 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:44.815580 systemd[1]: Created slice kubepods-besteffort-pod440eed8a_c20b_4a0b_89d3_7187a51dc10f.slice. Aug 13 00:03:44.821082 env[1812]: time="2025-08-13T00:03:44.821020604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-km7tf,Uid:440eed8a-c20b-4a0b-89d3-7187a51dc10f,Namespace:calico-system,Attempt:0,}" Aug 13 00:03:45.327614 env[1812]: time="2025-08-13T00:03:45.325280003Z" level=info msg="shim disconnected" id=3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a Aug 13 00:03:45.327614 env[1812]: time="2025-08-13T00:03:45.325365066Z" level=warning msg="cleaning up after shim disconnected" id=3803ebee02f6fcaa8910873d75ca1682f3e7ce1bfa7de13aab689a544b50603a namespace=k8s.io Aug 13 00:03:45.327614 env[1812]: time="2025-08-13T00:03:45.325389249Z" level=info msg="cleaning up dead shim" Aug 13 00:03:45.353889 env[1812]: time="2025-08-13T00:03:45.353807002Z" level=warning msg="cleanup warnings time=\"2025-08-13T00:03:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2640 runtime=io.containerd.runc.v2\n" Aug 13 00:03:45.468910 env[1812]: time="2025-08-13T00:03:45.468796703Z" level=error msg="Failed to destroy network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:45.471777 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2-shm.mount: Deactivated successfully. Aug 13 00:03:45.474286 env[1812]: time="2025-08-13T00:03:45.474216309Z" level=error msg="encountered an error cleaning up failed sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:45.474540 env[1812]: time="2025-08-13T00:03:45.474476775Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-km7tf,Uid:440eed8a-c20b-4a0b-89d3-7187a51dc10f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:45.474984 kubelet[2211]: E0813 00:03:45.474916 2211 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:45.475182 kubelet[2211]: E0813 00:03:45.475010 2211 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-km7tf" Aug 13 00:03:45.475182 kubelet[2211]: E0813 00:03:45.475048 2211 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-km7tf" Aug 13 00:03:45.475334 kubelet[2211]: E0813 00:03:45.475213 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-km7tf_calico-system(440eed8a-c20b-4a0b-89d3-7187a51dc10f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-km7tf_calico-system(440eed8a-c20b-4a0b-89d3-7187a51dc10f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-km7tf" podUID="440eed8a-c20b-4a0b-89d3-7187a51dc10f" Aug 13 00:03:45.479264 kubelet[2211]: E0813 00:03:45.479187 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:45.858699 kubelet[2211]: I0813 00:03:45.858654 2211 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:03:45.861050 env[1812]: time="2025-08-13T00:03:45.860973068Z" level=info msg="StopPodSandbox for \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\"" Aug 13 00:03:45.865504 env[1812]: time="2025-08-13T00:03:45.865441619Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Aug 13 00:03:45.921771 env[1812]: time="2025-08-13T00:03:45.921683324Z" level=error msg="StopPodSandbox for \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\" failed" error="failed to destroy network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:45.922619 kubelet[2211]: E0813 00:03:45.922264 2211 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:03:45.922619 kubelet[2211]: E0813 00:03:45.922373 2211 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2"} Aug 13 00:03:45.922619 kubelet[2211]: E0813 00:03:45.922483 2211 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"440eed8a-c20b-4a0b-89d3-7187a51dc10f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 00:03:45.922619 kubelet[2211]: E0813 00:03:45.922550 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"440eed8a-c20b-4a0b-89d3-7187a51dc10f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-km7tf" podUID="440eed8a-c20b-4a0b-89d3-7187a51dc10f" Aug 13 00:03:46.480273 kubelet[2211]: E0813 00:03:46.480205 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:47.309699 kubelet[2211]: I0813 00:03:47.309637 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qgtcv\" (UniqueName: \"kubernetes.io/projected/f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640-kube-api-access-qgtcv\") pod \"nginx-deployment-8587fbcb89-n6fgs\" (UID: \"f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640\") " pod="default/nginx-deployment-8587fbcb89-n6fgs" Aug 13 00:03:47.311614 systemd[1]: Created slice kubepods-besteffort-podf4e2d24c_669d_4fd6_a3b4_4ac5fcca3640.slice. Aug 13 00:03:47.318627 kubelet[2211]: W0813 00:03:47.318566 2211 reflector.go:561] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.18.161" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '172.31.18.161' and this object Aug 13 00:03:47.318807 kubelet[2211]: E0813 00:03:47.318777 2211 reflector.go:158] "Unhandled Error" err="object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:172.31.18.161\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"default\": no relationship found between node '172.31.18.161' and this object" logger="UnhandledError" Aug 13 00:03:47.481008 kubelet[2211]: E0813 00:03:47.480947 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:48.475455 kubelet[2211]: E0813 00:03:48.475395 2211 projected.go:288] Couldn't get configMap default/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Aug 13 00:03:48.475455 kubelet[2211]: E0813 00:03:48.475458 2211 projected.go:194] Error preparing data for projected volume kube-api-access-qgtcv for pod default/nginx-deployment-8587fbcb89-n6fgs: failed to sync configmap cache: timed out waiting for the condition Aug 13 00:03:48.475734 kubelet[2211]: E0813 00:03:48.475571 2211 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640-kube-api-access-qgtcv podName:f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640 nodeName:}" failed. No retries permitted until 2025-08-13 00:03:48.97553816 +0000 UTC m=+17.154519840 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-qgtcv" (UniqueName: "kubernetes.io/projected/f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640-kube-api-access-qgtcv") pod "nginx-deployment-8587fbcb89-n6fgs" (UID: "f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640") : failed to sync configmap cache: timed out waiting for the condition Aug 13 00:03:48.481973 kubelet[2211]: E0813 00:03:48.481915 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:48.758000 audit[2696]: NETFILTER_CFG table=filter:65 family=2 entries=12 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:48.762422 kernel: kauditd_printk_skb: 241 callbacks suppressed Aug 13 00:03:48.762572 kernel: audit: type=1325 audit(1755043428.758:549): table=filter:65 family=2 entries=12 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:48.758000 audit[2696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd5009710 a2=0 a3=1 items=0 ppid=2439 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:48.780383 kernel: audit: type=1300 audit(1755043428.758:549): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd5009710 a2=0 a3=1 items=0 ppid=2439 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:48.780497 kernel: audit: type=1327 audit(1755043428.758:549): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:48.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:48.779000 audit[2696]: NETFILTER_CFG table=nat:66 family=2 entries=22 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:48.792288 kernel: audit: type=1325 audit(1755043428.779:550): table=nat:66 family=2 entries=22 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:48.779000 audit[2696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd5009710 a2=0 a3=1 items=0 ppid=2439 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:48.804441 kernel: audit: type=1300 audit(1755043428.779:550): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd5009710 a2=0 a3=1 items=0 ppid=2439 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:48.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:48.810306 kernel: audit: type=1327 audit(1755043428.779:550): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:49.039063 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Aug 13 00:03:49.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:49.050264 kernel: audit: type=1131 audit(1755043429.039:551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:03:49.073585 kernel: audit: type=1334 audit(1755043429.067:552): prog-id=50 op=UNLOAD Aug 13 00:03:49.073718 kernel: audit: type=1334 audit(1755043429.067:553): prog-id=49 op=UNLOAD Aug 13 00:03:49.067000 audit: BPF prog-id=50 op=UNLOAD Aug 13 00:03:49.067000 audit: BPF prog-id=49 op=UNLOAD Aug 13 00:03:49.067000 audit: BPF prog-id=48 op=UNLOAD Aug 13 00:03:49.077167 kernel: audit: type=1334 audit(1755043429.067:554): prog-id=48 op=UNLOAD Aug 13 00:03:49.118528 env[1812]: time="2025-08-13T00:03:49.118470662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-n6fgs,Uid:f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640,Namespace:default,Attempt:0,}" Aug 13 00:03:49.267255 env[1812]: time="2025-08-13T00:03:49.267178507Z" level=error msg="Failed to destroy network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:49.270653 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c-shm.mount: Deactivated successfully. Aug 13 00:03:49.272444 env[1812]: time="2025-08-13T00:03:49.272367726Z" level=error msg="encountered an error cleaning up failed sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:49.272703 env[1812]: time="2025-08-13T00:03:49.272647996Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-n6fgs,Uid:f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:49.273721 kubelet[2211]: E0813 00:03:49.273186 2211 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:49.273721 kubelet[2211]: E0813 00:03:49.273273 2211 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-n6fgs" Aug 13 00:03:49.273721 kubelet[2211]: E0813 00:03:49.273308 2211 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-n6fgs" Aug 13 00:03:49.273996 kubelet[2211]: E0813 00:03:49.273387 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-n6fgs_default(f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-n6fgs_default(f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-n6fgs" podUID="f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640" Aug 13 00:03:49.484361 kubelet[2211]: E0813 00:03:49.482914 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:49.873448 kubelet[2211]: I0813 00:03:49.872259 2211 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:03:49.873886 env[1812]: time="2025-08-13T00:03:49.873819344Z" level=info msg="StopPodSandbox for \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\"" Aug 13 00:03:49.941095 env[1812]: time="2025-08-13T00:03:49.940996816Z" level=error msg="StopPodSandbox for \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\" failed" error="failed to destroy network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:03:49.941660 kubelet[2211]: E0813 00:03:49.941582 2211 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:03:49.941791 kubelet[2211]: E0813 00:03:49.941661 2211 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c"} Aug 13 00:03:49.941791 kubelet[2211]: E0813 00:03:49.941718 2211 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 00:03:49.941791 kubelet[2211]: E0813 00:03:49.941761 2211 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-n6fgs" podUID="f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640" Aug 13 00:03:49.987000 audit[2745]: NETFILTER_CFG table=filter:67 family=2 entries=11 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:49.987000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdec9b040 a2=0 a3=1 items=0 ppid=2439 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:49.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:49.992000 audit[2745]: NETFILTER_CFG table=nat:68 family=2 entries=29 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:49.992000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffdec9b040 a2=0 a3=1 items=0 ppid=2439 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:49.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:50.484209 kubelet[2211]: E0813 00:03:50.484111 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:51.485107 kubelet[2211]: E0813 00:03:51.485028 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:51.866000 audit[2747]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:51.866000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc17d70e0 a2=0 a3=1 items=0 ppid=2439 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:51.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:51.875000 audit[2747]: NETFILTER_CFG table=nat:70 family=2 entries=36 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:03:51.875000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffc17d70e0 a2=0 a3=1 items=0 ppid=2439 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:51.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:03:52.485449 kubelet[2211]: E0813 00:03:52.485378 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:53.453685 kubelet[2211]: E0813 00:03:53.453613 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:53.486600 kubelet[2211]: E0813 00:03:53.486530 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:53.886069 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount811383588.mount: Deactivated successfully. Aug 13 00:03:53.967142 env[1812]: time="2025-08-13T00:03:53.967043244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:53.975047 env[1812]: time="2025-08-13T00:03:53.974971901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:53.978745 env[1812]: time="2025-08-13T00:03:53.978675734Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:53.983416 env[1812]: time="2025-08-13T00:03:53.983311164Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:03:53.984421 env[1812]: time="2025-08-13T00:03:53.984305265Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9\"" Aug 13 00:03:54.023920 env[1812]: time="2025-08-13T00:03:54.023862364Z" level=info msg="CreateContainer within sandbox \"952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Aug 13 00:03:54.055555 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3156564733.mount: Deactivated successfully. Aug 13 00:03:54.064141 env[1812]: time="2025-08-13T00:03:54.064030422Z" level=info msg="CreateContainer within sandbox \"952000ffdbfaaa2f46277dcd4446821cbf30ec7eb1c5710ab0bfa135a9a43580\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0a23570ff1721b6873c1cdfa20c8b829372982f1b5ac74734b3a3aa3b164fa67\"" Aug 13 00:03:54.065036 env[1812]: time="2025-08-13T00:03:54.064986203Z" level=info msg="StartContainer for \"0a23570ff1721b6873c1cdfa20c8b829372982f1b5ac74734b3a3aa3b164fa67\"" Aug 13 00:03:54.098035 systemd[1]: Started cri-containerd-0a23570ff1721b6873c1cdfa20c8b829372982f1b5ac74734b3a3aa3b164fa67.scope. Aug 13 00:03:54.158855 kernel: kauditd_printk_skb: 12 callbacks suppressed Aug 13 00:03:54.159005 kernel: audit: type=1400 audit(1755043434.147:559): avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2284 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:54.172802 kernel: audit: type=1300 audit(1755043434.147:559): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2284 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:54.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061323335373066663137323162363837336331636466613230633862 Aug 13 00:03:54.183848 kernel: audit: type=1327 audit(1755043434.147:559): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061323335373066663137323162363837336331636466613230633862 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.192687 kernel: audit: type=1400 audit(1755043434.147:560): avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.206990 kernel: audit: type=1400 audit(1755043434.147:560): avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.215747 kernel: audit: type=1400 audit(1755043434.147:560): avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.224161 kernel: audit: type=1400 audit(1755043434.147:560): avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.233655 kernel: audit: type=1400 audit(1755043434.147:560): avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.241619 kernel: audit: type=1400 audit(1755043434.147:560): avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.249846 kernel: audit: type=1400 audit(1755043434.147:560): avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.147000 audit: BPF prog-id=81 op=LOAD Aug 13 00:03:54.147000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2284 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:54.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061323335373066663137323162363837336331636466613230633862 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.150000 audit: BPF prog-id=82 op=LOAD Aug 13 00:03:54.150000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2284 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:54.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061323335373066663137323162363837336331636466613230633862 Aug 13 00:03:54.158000 audit: BPF prog-id=82 op=UNLOAD Aug 13 00:03:54.158000 audit: BPF prog-id=81 op=UNLOAD Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:54.158000 audit: BPF prog-id=83 op=LOAD Aug 13 00:03:54.158000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2284 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:54.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061323335373066663137323162363837336331636466613230633862 Aug 13 00:03:54.252824 env[1812]: time="2025-08-13T00:03:54.250743446Z" level=info msg="StartContainer for \"0a23570ff1721b6873c1cdfa20c8b829372982f1b5ac74734b3a3aa3b164fa67\" returns successfully" Aug 13 00:03:54.489638 kubelet[2211]: E0813 00:03:54.487190 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:54.529740 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Aug 13 00:03:54.529883 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Aug 13 00:03:54.938302 kubelet[2211]: I0813 00:03:54.938101 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-7zv29" podStartSLOduration=3.515556247 podStartE2EDuration="21.93807904s" podCreationTimestamp="2025-08-13 00:03:33 +0000 UTC" firstStartedPulling="2025-08-13 00:03:35.564013702 +0000 UTC m=+3.742995382" lastFinishedPulling="2025-08-13 00:03:53.986536495 +0000 UTC m=+22.165518175" observedRunningTime="2025-08-13 00:03:54.935954756 +0000 UTC m=+23.114936460" watchObservedRunningTime="2025-08-13 00:03:54.93807904 +0000 UTC m=+23.117060732" Aug 13 00:03:55.488051 kubelet[2211]: E0813 00:03:55.487973 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:56.386000 audit[2852]: AVC avc: denied { write } for pid=2852 comm="tee" name="fd" dev="proc" ino=15785 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:03:56.386000 audit[2852]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd24c77f4 a2=241 a3=1b6 items=1 ppid=2824 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.386000 audit: CWD cwd="/etc/service/enabled/cni/log" Aug 13 00:03:56.386000 audit: PATH item=0 name="/dev/fd/63" inode=15778 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:56.386000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:03:56.405000 audit[2858]: AVC avc: denied { write } for pid=2858 comm="tee" name="fd" dev="proc" ino=15141 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:03:56.405000 audit[2858]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffede017f2 a2=241 a3=1b6 items=1 ppid=2830 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.405000 audit: CWD cwd="/etc/service/enabled/felix/log" Aug 13 00:03:56.405000 audit: PATH item=0 name="/dev/fd/63" inode=15781 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:56.405000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:03:56.413000 audit[2873]: AVC avc: denied { write } for pid=2873 comm="tee" name="fd" dev="proc" ino=15797 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:03:56.413000 audit[2873]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcce187f3 a2=241 a3=1b6 items=1 ppid=2828 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.413000 audit: CWD cwd="/etc/service/enabled/bird/log" Aug 13 00:03:56.413000 audit: PATH item=0 name="/dev/fd/63" inode=15136 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:56.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:03:56.424000 audit[2880]: AVC avc: denied { write } for pid=2880 comm="tee" name="fd" dev="proc" ino=15803 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:03:56.431000 audit[2882]: AVC avc: denied { write } for pid=2882 comm="tee" name="fd" dev="proc" ino=15804 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:03:56.431000 audit[2882]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd17517f2 a2=241 a3=1b6 items=1 ppid=2834 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.431000 audit: CWD cwd="/etc/service/enabled/bird6/log" Aug 13 00:03:56.424000 audit[2880]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeeaa77e3 a2=241 a3=1b6 items=1 ppid=2825 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.431000 audit: PATH item=0 name="/dev/fd/63" inode=15792 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:56.431000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:03:56.424000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Aug 13 00:03:56.424000 audit: PATH item=0 name="/dev/fd/63" inode=15143 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:56.424000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:03:56.441000 audit[2885]: AVC avc: denied { write } for pid=2885 comm="tee" name="fd" dev="proc" ino=15155 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:03:56.441000 audit[2885]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda8d27f2 a2=241 a3=1b6 items=1 ppid=2833 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.441000 audit: CWD cwd="/etc/service/enabled/confd/log" Aug 13 00:03:56.443000 audit[2890]: AVC avc: denied { write } for pid=2890 comm="tee" name="fd" dev="proc" ino=15159 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:03:56.443000 audit[2890]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc582f7e2 a2=241 a3=1b6 items=1 ppid=2831 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.443000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Aug 13 00:03:56.443000 audit: PATH item=0 name="/dev/fd/63" inode=15149 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:56.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:03:56.441000 audit: PATH item=0 name="/dev/fd/63" inode=15147 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:03:56.441000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:03:56.488272 kubelet[2211]: E0813 00:03:56.488198 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.918000 audit: BPF prog-id=84 op=LOAD Aug 13 00:03:56.918000 audit[2933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd634d148 a2=98 a3=ffffd634d138 items=0 ppid=2841 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.918000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:03:56.919000 audit: BPF prog-id=84 op=UNLOAD Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit: BPF prog-id=85 op=LOAD Aug 13 00:03:56.919000 audit[2933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd634cff8 a2=74 a3=95 items=0 ppid=2841 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.919000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:03:56.919000 audit: BPF prog-id=85 op=UNLOAD Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit: BPF prog-id=86 op=LOAD Aug 13 00:03:56.919000 audit[2933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd634d028 a2=40 a3=ffffd634d058 items=0 ppid=2841 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.919000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:03:56.919000 audit: BPF prog-id=86 op=UNLOAD Aug 13 00:03:56.919000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.919000 audit[2933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd634d140 a2=50 a3=0 items=0 ppid=2841 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.919000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.924000 audit: BPF prog-id=87 op=LOAD Aug 13 00:03:56.924000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffe4edb78 a2=98 a3=fffffe4edb68 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:56.925000 audit: BPF prog-id=87 op=UNLOAD Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.925000 audit: BPF prog-id=88 op=LOAD Aug 13 00:03:56.925000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffe4ed808 a2=74 a3=95 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.925000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:56.927000 audit: BPF prog-id=88 op=UNLOAD Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:56.927000 audit: BPF prog-id=89 op=LOAD Aug 13 00:03:56.927000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffe4ed868 a2=94 a3=2 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:56.927000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:56.928000 audit: BPF prog-id=89 op=UNLOAD Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.096000 audit: BPF prog-id=90 op=LOAD Aug 13 00:03:57.096000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffe4ed828 a2=40 a3=fffffe4ed858 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.097000 audit: BPF prog-id=90 op=UNLOAD Aug 13 00:03:57.097000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.097000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffe4ed940 a2=50 a3=0 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.114000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.114000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe4ed898 a2=28 a3=fffffe4ed9c8 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.114000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.115000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.115000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe4ed8c8 a2=28 a3=fffffe4ed9f8 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.115000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.115000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe4ed778 a2=28 a3=fffffe4ed8a8 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.115000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.115000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe4ed8e8 a2=28 a3=fffffe4eda18 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.115000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.115000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe4ed8c8 a2=28 a3=fffffe4ed9f8 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.116000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.116000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe4ed8b8 a2=28 a3=fffffe4ed9e8 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.116000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.116000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe4ed8e8 a2=28 a3=fffffe4eda18 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.116000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.116000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe4ed8c8 a2=28 a3=fffffe4ed9f8 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.116000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.117000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.117000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe4ed8e8 a2=28 a3=fffffe4eda18 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.117000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.117000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffe4ed8b8 a2=28 a3=fffffe4ed9e8 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.117000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.117000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffe4ed938 a2=28 a3=fffffe4eda78 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffe4ed670 a2=50 a3=0 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.118000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.118000 audit: BPF prog-id=91 op=LOAD Aug 13 00:03:57.118000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffe4ed678 a2=94 a3=5 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.118000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.119000 audit: BPF prog-id=91 op=UNLOAD Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffe4ed780 a2=50 a3=0 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.120000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffe4ed8c8 a2=4 a3=3 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.120000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.120000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:03:57.120000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffe4ed8a8 a2=94 a3=6 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.120000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.123000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:03:57.123000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffe4ed078 a2=94 a3=83 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.123000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.124000 audit[2934]: AVC avc: denied { confidentiality } for pid=2934 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:03:57.124000 audit[2934]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffe4ed078 a2=94 a3=83 items=0 ppid=2841 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.124000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.144000 audit: BPF prog-id=92 op=LOAD Aug 13 00:03:57.144000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf8c06d8 a2=98 a3=ffffdf8c06c8 items=0 ppid=2841 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.144000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:03:57.145000 audit: BPF prog-id=92 op=UNLOAD Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.145000 audit: BPF prog-id=93 op=LOAD Aug 13 00:03:57.145000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf8c0588 a2=74 a3=95 items=0 ppid=2841 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.145000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:03:57.146000 audit: BPF prog-id=93 op=UNLOAD Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.147000 audit: BPF prog-id=94 op=LOAD Aug 13 00:03:57.147000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf8c05b8 a2=40 a3=ffffdf8c05e8 items=0 ppid=2841 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.147000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:03:57.148000 audit: BPF prog-id=94 op=UNLOAD Aug 13 00:03:57.282832 systemd-networkd[1534]: vxlan.calico: Link UP Aug 13 00:03:57.282848 systemd-networkd[1534]: vxlan.calico: Gained carrier Aug 13 00:03:57.289434 (udev-worker)[2792]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.345193 (udev-worker)[2797]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:03:57.342000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.342000 audit: BPF prog-id=95 op=LOAD Aug 13 00:03:57.342000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffee2c8d88 a2=98 a3=ffffee2c8d78 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.347000 audit: BPF prog-id=95 op=UNLOAD Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.347000 audit: BPF prog-id=96 op=LOAD Aug 13 00:03:57.347000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffee2c8a68 a2=74 a3=95 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit: BPF prog-id=96 op=UNLOAD Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit: BPF prog-id=97 op=LOAD Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffee2c8ac8 a2=94 a3=2 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit: BPF prog-id=97 op=UNLOAD Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffee2c8af8 a2=28 a3=ffffee2c8c28 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee2c8b28 a2=28 a3=ffffee2c8c58 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee2c89d8 a2=28 a3=ffffee2c8b08 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffee2c8b48 a2=28 a3=ffffee2c8c78 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffee2c8b28 a2=28 a3=ffffee2c8c58 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffee2c8b18 a2=28 a3=ffffee2c8c48 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffee2c8b48 a2=28 a3=ffffee2c8c78 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee2c8b28 a2=28 a3=ffffee2c8c58 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee2c8b48 a2=28 a3=ffffee2c8c78 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffee2c8b18 a2=28 a3=ffffee2c8c48 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffee2c8b98 a2=28 a3=ffffee2c8cd8 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.348000 audit: BPF prog-id=98 op=LOAD Aug 13 00:03:57.348000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffee2c89b8 a2=40 a3=ffffee2c89e8 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.348000 audit: BPF prog-id=98 op=UNLOAD Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffee2c89e0 a2=50 a3=0 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffee2c89e0 a2=50 a3=0 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit: BPF prog-id=99 op=LOAD Aug 13 00:03:57.349000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffee2c8148 a2=94 a3=2 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.349000 audit: BPF prog-id=99 op=UNLOAD Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.349000 audit: BPF prog-id=100 op=LOAD Aug 13 00:03:57.349000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffee2c82d8 a2=94 a3=30 items=0 ppid=2841 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.359000 audit: BPF prog-id=101 op=LOAD Aug 13 00:03:57.359000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe8ae3ee8 a2=98 a3=ffffe8ae3ed8 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.359000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.360000 audit: BPF prog-id=101 op=UNLOAD Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit: BPF prog-id=102 op=LOAD Aug 13 00:03:57.360000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe8ae3b78 a2=74 a3=95 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.360000 audit: BPF prog-id=102 op=UNLOAD Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.360000 audit: BPF prog-id=103 op=LOAD Aug 13 00:03:57.360000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe8ae3bd8 a2=94 a3=2 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.360000 audit: BPF prog-id=103 op=UNLOAD Aug 13 00:03:57.489236 kubelet[2211]: E0813 00:03:57.489168 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.542000 audit: BPF prog-id=104 op=LOAD Aug 13 00:03:57.542000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe8ae3b98 a2=40 a3=ffffe8ae3bc8 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.542000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.543000 audit: BPF prog-id=104 op=UNLOAD Aug 13 00:03:57.543000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.543000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe8ae3cb0 a2=50 a3=0 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.543000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.561000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.561000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe8ae3c08 a2=28 a3=ffffe8ae3d38 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.561000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.561000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.561000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe8ae3c38 a2=28 a3=ffffe8ae3d68 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.561000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.561000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.561000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe8ae3ae8 a2=28 a3=ffffe8ae3c18 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.561000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.562000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.562000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe8ae3c58 a2=28 a3=ffffe8ae3d88 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.562000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.562000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.562000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe8ae3c38 a2=28 a3=ffffe8ae3d68 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.562000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.563000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.563000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe8ae3c28 a2=28 a3=ffffe8ae3d58 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.563000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.563000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.563000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe8ae3c58 a2=28 a3=ffffe8ae3d88 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.563000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.563000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.563000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe8ae3c38 a2=28 a3=ffffe8ae3d68 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.563000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.564000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.564000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe8ae3c58 a2=28 a3=ffffe8ae3d88 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.564000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.564000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.564000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe8ae3c28 a2=28 a3=ffffe8ae3d58 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.564000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.564000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.564000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe8ae3ca8 a2=28 a3=ffffe8ae3de8 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.564000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe8ae39e0 a2=50 a3=0 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.565000 audit: BPF prog-id=105 op=LOAD Aug 13 00:03:57.565000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe8ae39e8 a2=94 a3=5 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.566000 audit: BPF prog-id=105 op=UNLOAD Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe8ae3af0 a2=50 a3=0 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe8ae3c38 a2=4 a3=3 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.566000 audit[2967]: AVC avc: denied { confidentiality } for pid=2967 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:03:57.566000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe8ae3c18 a2=94 a3=6 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { confidentiality } for pid=2967 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:03:57.567000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe8ae33e8 a2=94 a3=83 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.567000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.567000 audit[2967]: AVC avc: denied { confidentiality } for pid=2967 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:03:57.567000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe8ae33e8 a2=94 a3=83 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.567000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.568000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.568000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe8ae4e28 a2=10 a3=ffffe8ae4f18 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.568000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.569000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.569000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe8ae4ce8 a2=10 a3=ffffe8ae4dd8 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.569000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.569000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.569000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe8ae4c58 a2=10 a3=ffffe8ae4dd8 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.569000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.569000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:03:57.569000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe8ae4c58 a2=10 a3=ffffe8ae4dd8 items=0 ppid=2841 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.569000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:03:57.579000 audit: BPF prog-id=100 op=UNLOAD Aug 13 00:03:57.642773 amazon-ssm-agent[1793]: 2025-08-13 00:03:57 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Aug 13 00:03:57.688000 audit[2993]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=2993 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:03:57.688000 audit[2993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe3709690 a2=0 a3=ffffa9715fa8 items=0 ppid=2841 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:03:57.706000 audit[2991]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:03:57.706000 audit[2991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe39d4a70 a2=0 a3=ffff979a4fa8 items=0 ppid=2841 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.706000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:03:57.708000 audit[2992]: NETFILTER_CFG table=nat:73 family=2 entries=15 op=nft_register_chain pid=2992 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:03:57.708000 audit[2992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc412c8e0 a2=0 a3=ffff82057fa8 items=0 ppid=2841 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.708000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:03:57.715000 audit[2998]: NETFILTER_CFG table=filter:74 family=2 entries=39 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:03:57.715000 audit[2998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffcacb7ed0 a2=0 a3=ffffadddbfa8 items=0 ppid=2841 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:03:57.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:03:58.490071 kubelet[2211]: E0813 00:03:58.490009 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:03:58.939331 systemd-networkd[1534]: vxlan.calico: Gained IPv6LL Aug 13 00:03:59.490185 kubelet[2211]: E0813 00:03:59.490115 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:00.491203 kubelet[2211]: E0813 00:04:00.491116 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:00.806783 env[1812]: time="2025-08-13T00:04:00.806563542Z" level=info msg="StopPodSandbox for \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\"" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.898 [INFO][3013] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.898 [INFO][3013] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" iface="eth0" netns="/var/run/netns/cni-47e96763-a48b-73ad-cffb-e808e37c5187" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.899 [INFO][3013] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" iface="eth0" netns="/var/run/netns/cni-47e96763-a48b-73ad-cffb-e808e37c5187" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.899 [INFO][3013] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" iface="eth0" netns="/var/run/netns/cni-47e96763-a48b-73ad-cffb-e808e37c5187" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.899 [INFO][3013] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.899 [INFO][3013] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.971 [INFO][3021] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.971 [INFO][3021] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.971 [INFO][3021] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.986 [WARNING][3021] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.986 [INFO][3021] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.992 [INFO][3021] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:01.000732 env[1812]: 2025-08-13 00:04:00.997 [INFO][3013] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:01.008177 env[1812]: time="2025-08-13T00:04:01.006299394Z" level=info msg="TearDown network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\" successfully" Aug 13 00:04:01.008177 env[1812]: time="2025-08-13T00:04:01.006363960Z" level=info msg="StopPodSandbox for \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\" returns successfully" Aug 13 00:04:01.008369 systemd[1]: run-netns-cni\x2d47e96763\x2da48b\x2d73ad\x2dcffb\x2de808e37c5187.mount: Deactivated successfully. Aug 13 00:04:01.010471 env[1812]: time="2025-08-13T00:04:01.010415034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-km7tf,Uid:440eed8a-c20b-4a0b-89d3-7187a51dc10f,Namespace:calico-system,Attempt:1,}" Aug 13 00:04:01.231039 (udev-worker)[3047]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:04:01.231932 systemd-networkd[1534]: calidfd999bd892: Link UP Aug 13 00:04:01.238690 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:04:01.238922 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidfd999bd892: link becomes ready Aug 13 00:04:01.239544 systemd-networkd[1534]: calidfd999bd892: Gained carrier Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.093 [INFO][3027] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.18.161-k8s-csi--node--driver--km7tf-eth0 csi-node-driver- calico-system 440eed8a-c20b-4a0b-89d3-7187a51dc10f 1262 0 2025-08-13 00:03:33 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:57bd658777 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.18.161 csi-node-driver-km7tf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calidfd999bd892 [] [] }} ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.094 [INFO][3027] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.144 [INFO][3041] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" HandleID="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.145 [INFO][3041] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" HandleID="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.18.161", "pod":"csi-node-driver-km7tf", "timestamp":"2025-08-13 00:04:01.144479644 +0000 UTC"}, Hostname:"172.31.18.161", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.145 [INFO][3041] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.145 [INFO][3041] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.145 [INFO][3041] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.18.161' Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.159 [INFO][3041] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.174 [INFO][3041] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.182 [INFO][3041] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.185 [INFO][3041] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.189 [INFO][3041] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.189 [INFO][3041] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.192 [INFO][3041] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674 Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.202 [INFO][3041] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.218 [INFO][3041] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.37.1/26] block=192.168.37.0/26 handle="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.218 [INFO][3041] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.1/26] handle="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" host="172.31.18.161" Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.218 [INFO][3041] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:01.275173 env[1812]: 2025-08-13 00:04:01.218 [INFO][3041] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.1/26] IPv6=[] ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" HandleID="k8s-pod-network.b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.276492 env[1812]: 2025-08-13 00:04:01.221 [INFO][3027] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-csi--node--driver--km7tf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"440eed8a-c20b-4a0b-89d3-7187a51dc10f", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"", Pod:"csi-node-driver-km7tf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfd999bd892", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:01.276492 env[1812]: 2025-08-13 00:04:01.222 [INFO][3027] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.1/32] ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.276492 env[1812]: 2025-08-13 00:04:01.222 [INFO][3027] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidfd999bd892 ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.276492 env[1812]: 2025-08-13 00:04:01.239 [INFO][3027] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.276492 env[1812]: 2025-08-13 00:04:01.240 [INFO][3027] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-csi--node--driver--km7tf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"440eed8a-c20b-4a0b-89d3-7187a51dc10f", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674", Pod:"csi-node-driver-km7tf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfd999bd892", MAC:"96:45:5a:dc:b5:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:01.276492 env[1812]: 2025-08-13 00:04:01.268 [INFO][3027] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674" Namespace="calico-system" Pod="csi-node-driver-km7tf" WorkloadEndpoint="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:01.292401 env[1812]: time="2025-08-13T00:04:01.292261066Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:04:01.292585 env[1812]: time="2025-08-13T00:04:01.292421532Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:04:01.292585 env[1812]: time="2025-08-13T00:04:01.292487754Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:04:01.293742 env[1812]: time="2025-08-13T00:04:01.293608374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674 pid=3068 runtime=io.containerd.runc.v2 Aug 13 00:04:01.343454 kernel: kauditd_printk_skb: 590 callbacks suppressed Aug 13 00:04:01.343603 kernel: audit: type=1325 audit(1755043441.298:674): table=filter:75 family=2 entries=38 op=nft_register_chain pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:04:01.298000 audit[3062]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:04:01.359716 kernel: audit: type=1300 audit(1755043441.298:674): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffd18e3e0 a2=0 a3=ffffad7a5fa8 items=0 ppid=2841 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:01.298000 audit[3062]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=fffffd18e3e0 a2=0 a3=ffffad7a5fa8 items=0 ppid=2841 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:01.298000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:04:01.369285 kernel: audit: type=1327 audit(1755043441.298:674): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:04:01.364418 systemd[1]: Started cri-containerd-b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674.scope. Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.411486 kernel: audit: type=1400 audit(1755043441.394:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.411638 kernel: audit: type=1400 audit(1755043441.394:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.419641 kernel: audit: type=1400 audit(1755043441.394:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.427717 kernel: audit: type=1400 audit(1755043441.394:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.436345 kernel: audit: type=1400 audit(1755043441.394:679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.452664 kernel: audit: type=1400 audit(1755043441.394:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.452847 kernel: audit: type=1400 audit(1755043441.394:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.402000 audit: BPF prog-id=106 op=LOAD Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3068 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:01.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396537343438383864663162616464613733313631646137343130 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3068 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:01.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396537343438383864663162616464613733313631646137343130 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.403000 audit: BPF prog-id=107 op=LOAD Aug 13 00:04:01.403000 audit[3078]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3068 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:01.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396537343438383864663162616464613733313631646137343130 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.410000 audit: BPF prog-id=108 op=LOAD Aug 13 00:04:01.410000 audit[3078]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3068 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:01.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396537343438383864663162616464613733313631646137343130 Aug 13 00:04:01.418000 audit: BPF prog-id=108 op=UNLOAD Aug 13 00:04:01.418000 audit: BPF prog-id=107 op=UNLOAD Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:01.418000 audit: BPF prog-id=109 op=LOAD Aug 13 00:04:01.418000 audit[3078]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3068 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:01.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396537343438383864663162616464613733313631646137343130 Aug 13 00:04:01.473809 env[1812]: time="2025-08-13T00:04:01.473749255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-km7tf,Uid:440eed8a-c20b-4a0b-89d3-7187a51dc10f,Namespace:calico-system,Attempt:1,} returns sandbox id \"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674\"" Aug 13 00:04:01.476733 env[1812]: time="2025-08-13T00:04:01.476681750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Aug 13 00:04:01.491494 kubelet[2211]: E0813 00:04:01.491309 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:02.005101 systemd[1]: run-containerd-runc-k8s.io-b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674-runc.nPIlxF.mount: Deactivated successfully. Aug 13 00:04:02.492248 kubelet[2211]: E0813 00:04:02.492174 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:02.807194 env[1812]: time="2025-08-13T00:04:02.806822369Z" level=info msg="StopPodSandbox for \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\"" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.905 [INFO][3121] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.906 [INFO][3121] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" iface="eth0" netns="/var/run/netns/cni-f16228f3-c2a1-94f3-94a0-183c5174c448" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.906 [INFO][3121] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" iface="eth0" netns="/var/run/netns/cni-f16228f3-c2a1-94f3-94a0-183c5174c448" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.906 [INFO][3121] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" iface="eth0" netns="/var/run/netns/cni-f16228f3-c2a1-94f3-94a0-183c5174c448" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.906 [INFO][3121] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.906 [INFO][3121] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.954 [INFO][3128] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.955 [INFO][3128] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.955 [INFO][3128] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.966 [WARNING][3128] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.966 [INFO][3128] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.969 [INFO][3128] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:02.974104 env[1812]: 2025-08-13 00:04:02.971 [INFO][3121] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:02.978495 env[1812]: time="2025-08-13T00:04:02.978426401Z" level=info msg="TearDown network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\" successfully" Aug 13 00:04:02.978679 env[1812]: time="2025-08-13T00:04:02.978642471Z" level=info msg="StopPodSandbox for \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\" returns successfully" Aug 13 00:04:02.981475 systemd[1]: run-netns-cni\x2df16228f3\x2dc2a1\x2d94f3\x2d94a0\x2d183c5174c448.mount: Deactivated successfully. Aug 13 00:04:02.983675 env[1812]: time="2025-08-13T00:04:02.983601627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-n6fgs,Uid:f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640,Namespace:default,Attempt:1,}" Aug 13 00:04:03.239084 env[1812]: time="2025-08-13T00:04:03.239004261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:03.246896 env[1812]: time="2025-08-13T00:04:03.246831844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:03.250784 env[1812]: time="2025-08-13T00:04:03.250722940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:03.252350 systemd-networkd[1534]: calib077b368238: Link UP Aug 13 00:04:03.258516 env[1812]: time="2025-08-13T00:04:03.258454543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:03.262684 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:04:03.262990 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib077b368238: link becomes ready Aug 13 00:04:03.263636 systemd-networkd[1534]: calib077b368238: Gained carrier Aug 13 00:04:03.275051 env[1812]: time="2025-08-13T00:04:03.274984068Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2\"" Aug 13 00:04:03.284283 env[1812]: time="2025-08-13T00:04:03.284224207Z" level=info msg="CreateContainer within sandbox \"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.100 [INFO][3134] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0 nginx-deployment-8587fbcb89- default f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640 1273 0 2025-08-13 00:03:47 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.18.161 nginx-deployment-8587fbcb89-n6fgs eth0 default [] [] [kns.default ksa.default.default] calib077b368238 [] [] }} ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.100 [INFO][3134] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.154 [INFO][3147] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" HandleID="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.155 [INFO][3147] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" HandleID="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c3210), Attrs:map[string]string{"namespace":"default", "node":"172.31.18.161", "pod":"nginx-deployment-8587fbcb89-n6fgs", "timestamp":"2025-08-13 00:04:03.154650004 +0000 UTC"}, Hostname:"172.31.18.161", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.155 [INFO][3147] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.155 [INFO][3147] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.155 [INFO][3147] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.18.161' Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.169 [INFO][3147] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.185 [INFO][3147] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.195 [INFO][3147] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.199 [INFO][3147] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.203 [INFO][3147] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.204 [INFO][3147] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.206 [INFO][3147] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9 Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.223 [INFO][3147] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.234 [INFO][3147] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.37.2/26] block=192.168.37.0/26 handle="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.234 [INFO][3147] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.2/26] handle="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" host="172.31.18.161" Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.235 [INFO][3147] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:03.286809 env[1812]: 2025-08-13 00:04:03.235 [INFO][3147] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.2/26] IPv6=[] ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" HandleID="k8s-pod-network.3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:03.288072 env[1812]: 2025-08-13 00:04:03.240 [INFO][3134] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-n6fgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib077b368238", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:03.288072 env[1812]: 2025-08-13 00:04:03.241 [INFO][3134] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.2/32] ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:03.288072 env[1812]: 2025-08-13 00:04:03.241 [INFO][3134] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib077b368238 ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:03.288072 env[1812]: 2025-08-13 00:04:03.264 [INFO][3134] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:03.288072 env[1812]: 2025-08-13 00:04:03.265 [INFO][3134] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9", Pod:"nginx-deployment-8587fbcb89-n6fgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib077b368238", MAC:"d6:b5:db:e9:93:94", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:03.288072 env[1812]: 2025-08-13 00:04:03.280 [INFO][3134] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9" Namespace="default" Pod="nginx-deployment-8587fbcb89-n6fgs" WorkloadEndpoint="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:03.294310 systemd-networkd[1534]: calidfd999bd892: Gained IPv6LL Aug 13 00:04:03.330708 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount599682546.mount: Deactivated successfully. Aug 13 00:04:03.334000 audit[3164]: NETFILTER_CFG table=filter:76 family=2 entries=42 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:04:03.334000 audit[3164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffd75347e0 a2=0 a3=ffff86093fa8 items=0 ppid=2841 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.334000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:04:03.345299 env[1812]: time="2025-08-13T00:04:03.345204829Z" level=info msg="CreateContainer within sandbox \"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"134ee8afd51f91a4b11d8a4fcd6cca2321d013bfd7dd161e4a66559474c5fdd5\"" Aug 13 00:04:03.346577 env[1812]: time="2025-08-13T00:04:03.346479928Z" level=info msg="StartContainer for \"134ee8afd51f91a4b11d8a4fcd6cca2321d013bfd7dd161e4a66559474c5fdd5\"" Aug 13 00:04:03.368977 env[1812]: time="2025-08-13T00:04:03.368486998Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:04:03.368977 env[1812]: time="2025-08-13T00:04:03.368648669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:04:03.368977 env[1812]: time="2025-08-13T00:04:03.368739379Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:04:03.369302 env[1812]: time="2025-08-13T00:04:03.369049588Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9 pid=3175 runtime=io.containerd.runc.v2 Aug 13 00:04:03.391173 update_engine[1807]: I0813 00:04:03.390738 1807 update_attempter.cc:509] Updating boot flags... Aug 13 00:04:03.409462 systemd[1]: Started cri-containerd-134ee8afd51f91a4b11d8a4fcd6cca2321d013bfd7dd161e4a66559474c5fdd5.scope. Aug 13 00:04:03.449189 systemd[1]: Started cri-containerd-3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9.scope. Aug 13 00:04:03.510385 kubelet[2211]: E0813 00:04:03.493306 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:03.523000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.523000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3068 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133346565386166643531663931613462313164386134666364366363 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.524000 audit: BPF prog-id=110 op=LOAD Aug 13 00:04:03.524000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3068 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133346565386166643531663931613462313164386134666364366363 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.526000 audit: BPF prog-id=111 op=LOAD Aug 13 00:04:03.526000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3068 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133346565386166643531663931613462313164386134666364366363 Aug 13 00:04:03.527000 audit: BPF prog-id=111 op=UNLOAD Aug 13 00:04:03.527000 audit: BPF prog-id=110 op=UNLOAD Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.527000 audit: BPF prog-id=112 op=LOAD Aug 13 00:04:03.527000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3068 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133346565386166643531663931613462313164386134666364366363 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.547000 audit: BPF prog-id=113 op=LOAD Aug 13 00:04:03.548000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.548000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3175 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333353865316134313233306265653230376438386166633434666230 Aug 13 00:04:03.549000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.549000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3175 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333353865316134313233306265653230376438386166633434666230 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.550000 audit: BPF prog-id=114 op=LOAD Aug 13 00:04:03.550000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3175 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333353865316134313233306265653230376438386166633434666230 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.552000 audit: BPF prog-id=115 op=LOAD Aug 13 00:04:03.552000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3175 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333353865316134313233306265653230376438386166633434666230 Aug 13 00:04:03.554000 audit: BPF prog-id=115 op=UNLOAD Aug 13 00:04:03.555000 audit: BPF prog-id=114 op=UNLOAD Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:03.555000 audit: BPF prog-id=116 op=LOAD Aug 13 00:04:03.555000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3175 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:03.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333353865316134313233306265653230376438386166633434666230 Aug 13 00:04:03.589877 env[1812]: time="2025-08-13T00:04:03.589630918Z" level=info msg="StartContainer for \"134ee8afd51f91a4b11d8a4fcd6cca2321d013bfd7dd161e4a66559474c5fdd5\" returns successfully" Aug 13 00:04:03.596661 env[1812]: time="2025-08-13T00:04:03.596594993Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Aug 13 00:04:03.660766 env[1812]: time="2025-08-13T00:04:03.660708848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-n6fgs,Uid:f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640,Namespace:default,Attempt:1,} returns sandbox id \"3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9\"" Aug 13 00:04:04.494432 kubelet[2211]: E0813 00:04:04.494351 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:04.586919 kubelet[2211]: I0813 00:04:04.586874 2211 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Aug 13 00:04:05.012671 systemd[1]: run-containerd-runc-k8s.io-0a23570ff1721b6873c1cdfa20c8b829372982f1b5ac74734b3a3aa3b164fa67-runc.dVBfWI.mount: Deactivated successfully. Aug 13 00:04:05.083910 systemd-networkd[1534]: calib077b368238: Gained IPv6LL Aug 13 00:04:05.200707 env[1812]: time="2025-08-13T00:04:05.200640793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:05.203192 env[1812]: time="2025-08-13T00:04:05.203093606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:05.205454 env[1812]: time="2025-08-13T00:04:05.205395474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:05.207992 env[1812]: time="2025-08-13T00:04:05.207931983Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:05.209279 env[1812]: time="2025-08-13T00:04:05.209234078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c\"" Aug 13 00:04:05.213475 env[1812]: time="2025-08-13T00:04:05.213412122Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Aug 13 00:04:05.215054 env[1812]: time="2025-08-13T00:04:05.214961162Z" level=info msg="CreateContainer within sandbox \"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Aug 13 00:04:05.236346 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount570639354.mount: Deactivated successfully. Aug 13 00:04:05.265069 env[1812]: time="2025-08-13T00:04:05.264110763Z" level=info msg="CreateContainer within sandbox \"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"75869b9fb5fd32310a8a79032f3cb8600d43c05b587abb55a20f81be4b430abc\"" Aug 13 00:04:05.265723 env[1812]: time="2025-08-13T00:04:05.265655337Z" level=info msg="StartContainer for \"75869b9fb5fd32310a8a79032f3cb8600d43c05b587abb55a20f81be4b430abc\"" Aug 13 00:04:05.320231 systemd[1]: Started cri-containerd-75869b9fb5fd32310a8a79032f3cb8600d43c05b587abb55a20f81be4b430abc.scope. Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3068 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:05.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735383639623966623566643332333130613861373930333266336362 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.360000 audit: BPF prog-id=117 op=LOAD Aug 13 00:04:05.360000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3068 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:05.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735383639623966623566643332333130613861373930333266336362 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit: BPF prog-id=118 op=LOAD Aug 13 00:04:05.361000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3068 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:05.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735383639623966623566643332333130613861373930333266336362 Aug 13 00:04:05.361000 audit: BPF prog-id=118 op=UNLOAD Aug 13 00:04:05.361000 audit: BPF prog-id=117 op=UNLOAD Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:05.361000 audit: BPF prog-id=119 op=LOAD Aug 13 00:04:05.361000 audit[3467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3068 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:05.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735383639623966623566643332333130613861373930333266336362 Aug 13 00:04:05.398078 env[1812]: time="2025-08-13T00:04:05.398014278Z" level=info msg="StartContainer for \"75869b9fb5fd32310a8a79032f3cb8600d43c05b587abb55a20f81be4b430abc\" returns successfully" Aug 13 00:04:05.494897 kubelet[2211]: E0813 00:04:05.494816 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:05.666195 kubelet[2211]: I0813 00:04:05.664285 2211 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Aug 13 00:04:05.666195 kubelet[2211]: I0813 00:04:05.664332 2211 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Aug 13 00:04:06.012781 systemd[1]: run-containerd-runc-k8s.io-75869b9fb5fd32310a8a79032f3cb8600d43c05b587abb55a20f81be4b430abc-runc.VVIdNp.mount: Deactivated successfully. Aug 13 00:04:06.495316 kubelet[2211]: E0813 00:04:06.495247 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:07.496376 kubelet[2211]: E0813 00:04:07.496299 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:08.496544 kubelet[2211]: E0813 00:04:08.496479 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:08.726661 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2371111173.mount: Deactivated successfully. Aug 13 00:04:09.497288 kubelet[2211]: E0813 00:04:09.497230 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:10.498186 kubelet[2211]: E0813 00:04:10.498093 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:10.992182 env[1812]: time="2025-08-13T00:04:10.992082511Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:10.996452 env[1812]: time="2025-08-13T00:04:10.996386481Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:07abd578947db789c018f907bed24fcc55d80455e9614b35a065bf3af4f3ac27,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:11.000378 env[1812]: time="2025-08-13T00:04:11.000325000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:11.004250 env[1812]: time="2025-08-13T00:04:11.004198833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:a6969d434cb816d30787e9f7ab16b632e12dc05a2c8f4dae701d83ef2199c985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:11.005751 env[1812]: time="2025-08-13T00:04:11.005673371Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:07abd578947db789c018f907bed24fcc55d80455e9614b35a065bf3af4f3ac27\"" Aug 13 00:04:11.011039 env[1812]: time="2025-08-13T00:04:11.010983630Z" level=info msg="CreateContainer within sandbox \"3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Aug 13 00:04:11.041259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount842622047.mount: Deactivated successfully. Aug 13 00:04:11.056015 env[1812]: time="2025-08-13T00:04:11.055925953Z" level=info msg="CreateContainer within sandbox \"3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c13f47c4e30146f5090b833be8df6394ba4b4c75e00bb40b21a6e1b72ed5f1eb\"" Aug 13 00:04:11.057018 env[1812]: time="2025-08-13T00:04:11.056968787Z" level=info msg="StartContainer for \"c13f47c4e30146f5090b833be8df6394ba4b4c75e00bb40b21a6e1b72ed5f1eb\"" Aug 13 00:04:11.103607 systemd[1]: Started cri-containerd-c13f47c4e30146f5090b833be8df6394ba4b4c75e00bb40b21a6e1b72ed5f1eb.scope. Aug 13 00:04:11.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138138 kernel: kauditd_printk_skb: 196 callbacks suppressed Aug 13 00:04:11.138236 kernel: audit: type=1400 audit(1755043451.135:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.153933 kernel: audit: type=1400 audit(1755043451.138:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154071 kernel: audit: type=1400 audit(1755043451.138:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.170009 kernel: audit: type=1400 audit(1755043451.138:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.170102 kernel: audit: type=1400 audit(1755043451.138:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.185825 kernel: audit: type=1400 audit(1755043451.138:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.186274 kernel: audit: type=1400 audit(1755043451.138:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.201892 kernel: audit: type=1400 audit(1755043451.138:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.210019 kernel: audit: type=1400 audit(1755043451.138:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.210394 kernel: audit: type=1400 audit(1755043451.145:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.145000 audit: BPF prog-id=120 op=LOAD Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3175 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:11.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336634376334653330313436663530393062383333626538646636 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3175 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:11.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336634376334653330313436663530393062383333626538646636 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.146000 audit: BPF prog-id=121 op=LOAD Aug 13 00:04:11.146000 audit[3514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3175 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:11.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336634376334653330313436663530393062383333626538646636 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.154000 audit: BPF prog-id=122 op=LOAD Aug 13 00:04:11.154000 audit[3514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3175 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:11.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336634376334653330313436663530393062383333626538646636 Aug 13 00:04:11.161000 audit: BPF prog-id=122 op=UNLOAD Aug 13 00:04:11.161000 audit: BPF prog-id=121 op=UNLOAD Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:11.161000 audit: BPF prog-id=123 op=LOAD Aug 13 00:04:11.161000 audit[3514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3175 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:11.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336634376334653330313436663530393062383333626538646636 Aug 13 00:04:11.232592 env[1812]: time="2025-08-13T00:04:11.232527647Z" level=info msg="StartContainer for \"c13f47c4e30146f5090b833be8df6394ba4b4c75e00bb40b21a6e1b72ed5f1eb\" returns successfully" Aug 13 00:04:11.499240 kubelet[2211]: E0813 00:04:11.499182 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:11.815000 audit[3563]: NETFILTER_CFG table=filter:77 family=2 entries=9 op=nft_register_rule pid=3563 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:11.815000 audit[3563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd29063d0 a2=0 a3=1 items=0 ppid=2439 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:11.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:11.823000 audit[3563]: NETFILTER_CFG table=nat:78 family=2 entries=31 op=nft_register_chain pid=3563 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:11.823000 audit[3563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffd29063d0 a2=0 a3=1 items=0 ppid=2439 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:11.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:11.960906 kubelet[2211]: I0813 00:04:11.960787 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-km7tf" podStartSLOduration=35.22498353 podStartE2EDuration="38.960764685s" podCreationTimestamp="2025-08-13 00:03:33 +0000 UTC" firstStartedPulling="2025-08-13 00:04:01.475897765 +0000 UTC m=+29.654879445" lastFinishedPulling="2025-08-13 00:04:05.211678932 +0000 UTC m=+33.390660600" observedRunningTime="2025-08-13 00:04:05.95402594 +0000 UTC m=+34.133007632" watchObservedRunningTime="2025-08-13 00:04:11.960764685 +0000 UTC m=+40.139746389" Aug 13 00:04:12.500068 kubelet[2211]: E0813 00:04:12.500013 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:13.454041 kubelet[2211]: E0813 00:04:13.453970 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:13.501585 kubelet[2211]: E0813 00:04:13.501521 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:14.502306 kubelet[2211]: E0813 00:04:14.502238 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:15.502764 kubelet[2211]: E0813 00:04:15.502691 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:16.503714 kubelet[2211]: E0813 00:04:16.503668 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:17.504977 kubelet[2211]: E0813 00:04:17.504929 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:18.506399 kubelet[2211]: E0813 00:04:18.506327 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:19.506703 kubelet[2211]: E0813 00:04:19.506638 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:20.507243 kubelet[2211]: E0813 00:04:20.507198 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:21.211000 audit[3573]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.215075 kernel: kauditd_printk_skb: 53 callbacks suppressed Aug 13 00:04:21.215232 kernel: audit: type=1325 audit(1755043461.211:744): table=filter:79 family=2 entries=20 op=nft_register_rule pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.211000 audit[3573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc3aa15f0 a2=0 a3=1 items=0 ppid=2439 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:21.233159 kernel: audit: type=1300 audit(1755043461.211:744): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc3aa15f0 a2=0 a3=1 items=0 ppid=2439 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:21.233310 kernel: audit: type=1327 audit(1755043461.211:744): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:21.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:21.222000 audit[3573]: NETFILTER_CFG table=nat:80 family=2 entries=26 op=nft_register_rule pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.244902 kernel: audit: type=1325 audit(1755043461.222:745): table=nat:80 family=2 entries=26 op=nft_register_rule pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.222000 audit[3573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffc3aa15f0 a2=0 a3=1 items=0 ppid=2439 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:21.256993 kernel: audit: type=1300 audit(1755043461.222:745): arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffc3aa15f0 a2=0 a3=1 items=0 ppid=2439 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:21.257190 kernel: audit: type=1327 audit(1755043461.222:745): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:21.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:21.275000 audit[3575]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=3575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.275000 audit[3575]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd9a64460 a2=0 a3=1 items=0 ppid=2439 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:21.295322 kernel: audit: type=1325 audit(1755043461.275:746): table=filter:81 family=2 entries=32 op=nft_register_rule pid=3575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.295441 kernel: audit: type=1300 audit(1755043461.275:746): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd9a64460 a2=0 a3=1 items=0 ppid=2439 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:21.295513 kernel: audit: type=1327 audit(1755043461.275:746): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:21.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:21.296000 audit[3575]: NETFILTER_CFG table=nat:82 family=2 entries=26 op=nft_register_rule pid=3575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.307587 kernel: audit: type=1325 audit(1755043461.296:747): table=nat:82 family=2 entries=26 op=nft_register_rule pid=3575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:21.296000 audit[3575]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffd9a64460 a2=0 a3=1 items=0 ppid=2439 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:21.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:21.508821 kubelet[2211]: E0813 00:04:21.508644 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:21.548913 kubelet[2211]: I0813 00:04:21.548825 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-n6fgs" podStartSLOduration=27.20378809 podStartE2EDuration="34.548804218s" podCreationTimestamp="2025-08-13 00:03:47 +0000 UTC" firstStartedPulling="2025-08-13 00:04:03.663639556 +0000 UTC m=+31.842621236" lastFinishedPulling="2025-08-13 00:04:11.008655684 +0000 UTC m=+39.187637364" observedRunningTime="2025-08-13 00:04:11.961811973 +0000 UTC m=+40.140793653" watchObservedRunningTime="2025-08-13 00:04:21.548804218 +0000 UTC m=+49.727785958" Aug 13 00:04:21.559565 systemd[1]: Created slice kubepods-besteffort-pod3f96f327_2a11_4029_8796_5a735e76d019.slice. Aug 13 00:04:21.649146 kubelet[2211]: I0813 00:04:21.649021 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/3f96f327-2a11-4029-8796-5a735e76d019-data\") pod \"nfs-server-provisioner-0\" (UID: \"3f96f327-2a11-4029-8796-5a735e76d019\") " pod="default/nfs-server-provisioner-0" Aug 13 00:04:21.649332 kubelet[2211]: I0813 00:04:21.649181 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xdhj6\" (UniqueName: \"kubernetes.io/projected/3f96f327-2a11-4029-8796-5a735e76d019-kube-api-access-xdhj6\") pod \"nfs-server-provisioner-0\" (UID: \"3f96f327-2a11-4029-8796-5a735e76d019\") " pod="default/nfs-server-provisioner-0" Aug 13 00:04:21.867134 env[1812]: time="2025-08-13T00:04:21.866539846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3f96f327-2a11-4029-8796-5a735e76d019,Namespace:default,Attempt:0,}" Aug 13 00:04:22.134647 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:04:22.134810 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Aug 13 00:04:22.135034 systemd-networkd[1534]: cali60e51b789ff: Link UP Aug 13 00:04:22.135594 systemd-networkd[1534]: cali60e51b789ff: Gained carrier Aug 13 00:04:22.138403 (udev-worker)[3597]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:21.973 [INFO][3578] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.18.161-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 3f96f327-2a11-4029-8796-5a735e76d019 1361 0 2025-08-13 00:04:21 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.18.161 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:21.974 [INFO][3578] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.022 [INFO][3590] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" HandleID="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Workload="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.023 [INFO][3590] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" HandleID="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Workload="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3020), Attrs:map[string]string{"namespace":"default", "node":"172.31.18.161", "pod":"nfs-server-provisioner-0", "timestamp":"2025-08-13 00:04:22.022570935 +0000 UTC"}, Hostname:"172.31.18.161", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.023 [INFO][3590] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.023 [INFO][3590] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.023 [INFO][3590] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.18.161' Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.054 [INFO][3590] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.071 [INFO][3590] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.080 [INFO][3590] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.083 [INFO][3590] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.086 [INFO][3590] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.087 [INFO][3590] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.090 [INFO][3590] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166 Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.099 [INFO][3590] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.120 [INFO][3590] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.37.3/26] block=192.168.37.0/26 handle="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.120 [INFO][3590] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.3/26] handle="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" host="172.31.18.161" Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.120 [INFO][3590] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:22.172008 env[1812]: 2025-08-13 00:04:22.121 [INFO][3590] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.3/26] IPv6=[] ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" HandleID="k8s-pod-network.efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Workload="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:04:22.177867 env[1812]: 2025-08-13 00:04:22.124 [INFO][3578] cni-plugin/k8s.go 418: Populated endpoint ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3f96f327-2a11-4029-8796-5a735e76d019", ResourceVersion:"1361", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 4, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:22.177867 env[1812]: 2025-08-13 00:04:22.124 [INFO][3578] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.3/32] ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:04:22.177867 env[1812]: 2025-08-13 00:04:22.125 [INFO][3578] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:04:22.177867 env[1812]: 2025-08-13 00:04:22.137 [INFO][3578] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:04:22.180453 env[1812]: 2025-08-13 00:04:22.138 [INFO][3578] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3f96f327-2a11-4029-8796-5a735e76d019", ResourceVersion:"1361", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 4, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"22:94:ad:7f:13:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:22.180453 env[1812]: 2025-08-13 00:04:22.168 [INFO][3578] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.18.161-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:04:22.199224 env[1812]: time="2025-08-13T00:04:22.199062145Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:04:22.199224 env[1812]: time="2025-08-13T00:04:22.199165460Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:04:22.199528 env[1812]: time="2025-08-13T00:04:22.199194193Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:04:22.200197 env[1812]: time="2025-08-13T00:04:22.199910812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166 pid=3616 runtime=io.containerd.runc.v2 Aug 13 00:04:22.214000 audit[3621]: NETFILTER_CFG table=filter:83 family=2 entries=40 op=nft_register_chain pid=3621 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:04:22.214000 audit[3621]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffec796960 a2=0 a3=ffff833bffa8 items=0 ppid=2841 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:22.214000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:04:22.242803 systemd[1]: Started cri-containerd-efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166.scope. Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.279000 audit: BPF prog-id=124 op=LOAD Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623762333464396463346561383139333138313936343137303863 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623762333464396463346561383139333138313936343137303863 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit: BPF prog-id=125 op=LOAD Aug 13 00:04:22.280000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623762333464396463346561383139333138313936343137303863 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.280000 audit: BPF prog-id=126 op=LOAD Aug 13 00:04:22.280000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623762333464396463346561383139333138313936343137303863 Aug 13 00:04:22.280000 audit: BPF prog-id=126 op=UNLOAD Aug 13 00:04:22.281000 audit: BPF prog-id=125 op=UNLOAD Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:22.281000 audit: BPF prog-id=127 op=LOAD Aug 13 00:04:22.281000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:22.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623762333464396463346561383139333138313936343137303863 Aug 13 00:04:22.324941 env[1812]: time="2025-08-13T00:04:22.324873949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3f96f327-2a11-4029-8796-5a735e76d019,Namespace:default,Attempt:0,} returns sandbox id \"efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166\"" Aug 13 00:04:22.328455 env[1812]: time="2025-08-13T00:04:22.328397836Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Aug 13 00:04:22.509029 kubelet[2211]: E0813 00:04:22.508970 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:22.780595 systemd[1]: run-containerd-runc-k8s.io-efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166-runc.O9zAOn.mount: Deactivated successfully. Aug 13 00:04:23.509245 kubelet[2211]: E0813 00:04:23.509172 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:23.643979 systemd-networkd[1534]: cali60e51b789ff: Gained IPv6LL Aug 13 00:04:24.509862 kubelet[2211]: E0813 00:04:24.509816 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:25.510917 kubelet[2211]: E0813 00:04:25.510854 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:25.549528 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2853098622.mount: Deactivated successfully. Aug 13 00:04:26.512705 kubelet[2211]: E0813 00:04:26.512612 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:27.513580 kubelet[2211]: E0813 00:04:27.513484 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:28.514576 kubelet[2211]: E0813 00:04:28.514503 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:29.020923 env[1812]: time="2025-08-13T00:04:29.020852236Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:29.023823 env[1812]: time="2025-08-13T00:04:29.023759203Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:29.027037 env[1812]: time="2025-08-13T00:04:29.026974761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:29.030419 env[1812]: time="2025-08-13T00:04:29.030354985Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:29.032355 env[1812]: time="2025-08-13T00:04:29.032301336Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Aug 13 00:04:29.037383 env[1812]: time="2025-08-13T00:04:29.037303813Z" level=info msg="CreateContainer within sandbox \"efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Aug 13 00:04:29.055106 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1891821485.mount: Deactivated successfully. Aug 13 00:04:29.074409 env[1812]: time="2025-08-13T00:04:29.074337595Z" level=info msg="CreateContainer within sandbox \"efb7b34d9dc4ea81931819641708c7a2a2d9e06abb455f31a1f5d0249fccc166\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"732171dece54a8b94c90cb5b08303d9c003c88afe98368c77ace295a1db99c0b\"" Aug 13 00:04:29.075522 env[1812]: time="2025-08-13T00:04:29.075470293Z" level=info msg="StartContainer for \"732171dece54a8b94c90cb5b08303d9c003c88afe98368c77ace295a1db99c0b\"" Aug 13 00:04:29.123989 systemd[1]: Started cri-containerd-732171dece54a8b94c90cb5b08303d9c003c88afe98368c77ace295a1db99c0b.scope. Aug 13 00:04:29.171062 kernel: kauditd_printk_skb: 62 callbacks suppressed Aug 13 00:04:29.171232 kernel: audit: type=1400 audit(1755043469.160:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179853 kernel: audit: type=1400 audit(1755043469.161:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.188100 kernel: audit: type=1400 audit(1755043469.161:769): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.196528 kernel: audit: type=1400 audit(1755043469.161:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.204851 kernel: audit: type=1400 audit(1755043469.161:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.204972 kernel: audit: type=1400 audit(1755043469.161:772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.220869 kernel: audit: type=1400 audit(1755043469.161:773): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.220977 kernel: audit: type=1400 audit(1755043469.161:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.237359 kernel: audit: type=1400 audit(1755043469.161:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.237476 kernel: audit: type=1400 audit(1755043469.170:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit: BPF prog-id=128 op=LOAD Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3616 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:29.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323137316465636535346138623934633930636235623038333033 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3616 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:29.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323137316465636535346138623934633930636235623038333033 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.170000 audit: BPF prog-id=129 op=LOAD Aug 13 00:04:29.170000 audit[3660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3616 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:29.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323137316465636535346138623934633930636235623038333033 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.178000 audit: BPF prog-id=130 op=LOAD Aug 13 00:04:29.178000 audit[3660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3616 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:29.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323137316465636535346138623934633930636235623038333033 Aug 13 00:04:29.178000 audit: BPF prog-id=130 op=UNLOAD Aug 13 00:04:29.178000 audit: BPF prog-id=129 op=UNLOAD Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:29.179000 audit: BPF prog-id=131 op=LOAD Aug 13 00:04:29.179000 audit[3660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3616 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:29.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323137316465636535346138623934633930636235623038333033 Aug 13 00:04:29.268924 env[1812]: time="2025-08-13T00:04:29.268805330Z" level=info msg="StartContainer for \"732171dece54a8b94c90cb5b08303d9c003c88afe98368c77ace295a1db99c0b\" returns successfully" Aug 13 00:04:29.396000 audit[3687]: AVC avc: denied { search } for pid=3687 comm="rpcbind" name="crypto" dev="proc" ino=19707 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:04:29.396000 audit[3687]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffadcbf000 a2=0 a3=0 items=0 ppid=3671 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 key=(null) Aug 13 00:04:29.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Aug 13 00:04:29.479000 audit[3692]: AVC avc: denied { search } for pid=3692 comm="dbus-daemon" name="crypto" dev="proc" ino=19707 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:04:29.479000 audit[3692]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9c14f000 a2=0 a3=0 items=0 ppid=3671 pid=3692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 key=(null) Aug 13 00:04:29.479000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Aug 13 00:04:29.486000 audit[3693]: AVC avc: denied { watch } for pid=3693 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538054 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c441,c453 tclass=dir permissive=0 Aug 13 00:04:29.486000 audit[3693]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaafa231220 a2=2c8 a3=aaaafa223a60 items=0 ppid=3671 pid=3693 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 key=(null) Aug 13 00:04:29.486000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Aug 13 00:04:29.496000 audit[3694]: AVC avc: denied { read } for pid=3694 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=19806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Aug 13 00:04:29.496000 audit[3694]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb4f4a570 a2=80000 a3=0 items=0 ppid=3671 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 key=(null) Aug 13 00:04:29.496000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Aug 13 00:04:29.498000 audit[3694]: AVC avc: denied { search } for pid=3694 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19707 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:04:29.498000 audit[3694]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb42df000 a2=0 a3=0 items=0 ppid=3671 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c453 key=(null) Aug 13 00:04:29.498000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Aug 13 00:04:29.515021 kubelet[2211]: E0813 00:04:29.514961 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:30.050494 systemd[1]: run-containerd-runc-k8s.io-732171dece54a8b94c90cb5b08303d9c003c88afe98368c77ace295a1db99c0b-runc.u5Qhzs.mount: Deactivated successfully. Aug 13 00:04:30.054649 kubelet[2211]: I0813 00:04:30.054529 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.347018088 podStartE2EDuration="9.054507467s" podCreationTimestamp="2025-08-13 00:04:21 +0000 UTC" firstStartedPulling="2025-08-13 00:04:22.327268075 +0000 UTC m=+50.506249767" lastFinishedPulling="2025-08-13 00:04:29.034757466 +0000 UTC m=+57.213739146" observedRunningTime="2025-08-13 00:04:30.050998573 +0000 UTC m=+58.229980277" watchObservedRunningTime="2025-08-13 00:04:30.054507467 +0000 UTC m=+58.233489147" Aug 13 00:04:30.103000 audit[3699]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=3699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:30.103000 audit[3699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffecafab20 a2=0 a3=1 items=0 ppid=2439 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:30.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:30.112000 audit[3699]: NETFILTER_CFG table=nat:85 family=2 entries=110 op=nft_register_chain pid=3699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:04:30.112000 audit[3699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffecafab20 a2=0 a3=1 items=0 ppid=2439 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:30.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:04:30.516091 kubelet[2211]: E0813 00:04:30.516046 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:31.517180 kubelet[2211]: E0813 00:04:31.517097 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:32.518249 kubelet[2211]: E0813 00:04:32.518175 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:33.453690 kubelet[2211]: E0813 00:04:33.453611 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:33.514075 env[1812]: time="2025-08-13T00:04:33.514002462Z" level=info msg="StopPodSandbox for \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\"" Aug 13 00:04:33.519316 kubelet[2211]: E0813 00:04:33.519234 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.584 [WARNING][3713] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-csi--node--driver--km7tf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"440eed8a-c20b-4a0b-89d3-7187a51dc10f", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674", Pod:"csi-node-driver-km7tf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfd999bd892", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.585 [INFO][3713] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.585 [INFO][3713] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" iface="eth0" netns="" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.585 [INFO][3713] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.585 [INFO][3713] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.622 [INFO][3720] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.623 [INFO][3720] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.623 [INFO][3720] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.637 [WARNING][3720] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.637 [INFO][3720] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.640 [INFO][3720] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:33.645821 env[1812]: 2025-08-13 00:04:33.643 [INFO][3713] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.646853 env[1812]: time="2025-08-13T00:04:33.645999765Z" level=info msg="TearDown network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\" successfully" Aug 13 00:04:33.646853 env[1812]: time="2025-08-13T00:04:33.646050268Z" level=info msg="StopPodSandbox for \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\" returns successfully" Aug 13 00:04:33.647437 env[1812]: time="2025-08-13T00:04:33.647368293Z" level=info msg="RemovePodSandbox for \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\"" Aug 13 00:04:33.647529 env[1812]: time="2025-08-13T00:04:33.647435190Z" level=info msg="Forcibly stopping sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\"" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.722 [WARNING][3735] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-csi--node--driver--km7tf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"440eed8a-c20b-4a0b-89d3-7187a51dc10f", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"b49e744888df1badda73161da741016eb14110204ed91ac7398c2ded7326a674", Pod:"csi-node-driver-km7tf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfd999bd892", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.722 [INFO][3735] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.722 [INFO][3735] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" iface="eth0" netns="" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.723 [INFO][3735] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.723 [INFO][3735] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.758 [INFO][3743] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.759 [INFO][3743] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.759 [INFO][3743] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.774 [WARNING][3743] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.774 [INFO][3743] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" HandleID="k8s-pod-network.4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Workload="172.31.18.161-k8s-csi--node--driver--km7tf-eth0" Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.777 [INFO][3743] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:33.782347 env[1812]: 2025-08-13 00:04:33.779 [INFO][3735] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2" Aug 13 00:04:33.782347 env[1812]: time="2025-08-13T00:04:33.782172801Z" level=info msg="TearDown network for sandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\" successfully" Aug 13 00:04:33.790878 env[1812]: time="2025-08-13T00:04:33.790818619Z" level=info msg="RemovePodSandbox \"4168e4b7008f49830bb02aa38fd44783a29c593664d170696db173f371e043e2\" returns successfully" Aug 13 00:04:33.792262 env[1812]: time="2025-08-13T00:04:33.792207658Z" level=info msg="StopPodSandbox for \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\"" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.901 [WARNING][3757] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640", ResourceVersion:"1322", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9", Pod:"nginx-deployment-8587fbcb89-n6fgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib077b368238", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.902 [INFO][3757] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.902 [INFO][3757] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" iface="eth0" netns="" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.902 [INFO][3757] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.902 [INFO][3757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.947 [INFO][3767] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.948 [INFO][3767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.948 [INFO][3767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.991 [WARNING][3767] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:33.992 [INFO][3767] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:34.003 [INFO][3767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:34.009307 env[1812]: 2025-08-13 00:04:34.006 [INFO][3757] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.010315 env[1812]: time="2025-08-13T00:04:34.009354220Z" level=info msg="TearDown network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\" successfully" Aug 13 00:04:34.010315 env[1812]: time="2025-08-13T00:04:34.009405395Z" level=info msg="StopPodSandbox for \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\" returns successfully" Aug 13 00:04:34.010731 env[1812]: time="2025-08-13T00:04:34.010685958Z" level=info msg="RemovePodSandbox for \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\"" Aug 13 00:04:34.010926 env[1812]: time="2025-08-13T00:04:34.010859910Z" level=info msg="Forcibly stopping sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\"" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.128 [WARNING][3781] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"f4e2d24c-669d-4fd6-a3b4-4ac5fcca3640", ResourceVersion:"1322", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 3, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"3358e1a41230bee207d88afc44fb043da2012635c8ec29f0a17a8af2dd474ee9", Pod:"nginx-deployment-8587fbcb89-n6fgs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib077b368238", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.129 [INFO][3781] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.129 [INFO][3781] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" iface="eth0" netns="" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.129 [INFO][3781] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.129 [INFO][3781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.170 [INFO][3788] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.170 [INFO][3788] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.171 [INFO][3788] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.205 [WARNING][3788] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.205 [INFO][3788] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" HandleID="k8s-pod-network.4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Workload="172.31.18.161-k8s-nginx--deployment--8587fbcb89--n6fgs-eth0" Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.216 [INFO][3788] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:34.221797 env[1812]: 2025-08-13 00:04:34.219 [INFO][3781] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c" Aug 13 00:04:34.222775 env[1812]: time="2025-08-13T00:04:34.221844903Z" level=info msg="TearDown network for sandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\" successfully" Aug 13 00:04:34.228280 env[1812]: time="2025-08-13T00:04:34.228209832Z" level=info msg="RemovePodSandbox \"4478502e0851b166760d99d1ab20af2639d5ecac26300b0b54b757d346303a0c\" returns successfully" Aug 13 00:04:34.520394 kubelet[2211]: E0813 00:04:34.520225 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:34.619755 systemd[1]: run-containerd-runc-k8s.io-0a23570ff1721b6873c1cdfa20c8b829372982f1b5ac74734b3a3aa3b164fa67-runc.9bCYbp.mount: Deactivated successfully. Aug 13 00:04:35.520665 kubelet[2211]: E0813 00:04:35.520578 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:36.521474 kubelet[2211]: E0813 00:04:36.521405 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:37.521775 kubelet[2211]: E0813 00:04:37.521673 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:38.522367 kubelet[2211]: E0813 00:04:38.522300 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:39.523352 kubelet[2211]: E0813 00:04:39.523309 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:40.524369 kubelet[2211]: E0813 00:04:40.524303 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:41.525268 kubelet[2211]: E0813 00:04:41.525202 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:42.526357 kubelet[2211]: E0813 00:04:42.526310 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:43.527346 kubelet[2211]: E0813 00:04:43.527302 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:44.528733 kubelet[2211]: E0813 00:04:44.528625 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:45.529519 kubelet[2211]: E0813 00:04:45.529439 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:46.529852 kubelet[2211]: E0813 00:04:46.529788 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:47.530859 kubelet[2211]: E0813 00:04:47.530790 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:48.531586 kubelet[2211]: E0813 00:04:48.531512 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:49.532396 kubelet[2211]: E0813 00:04:49.532350 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:50.534012 kubelet[2211]: E0813 00:04:50.533933 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:51.534566 kubelet[2211]: E0813 00:04:51.534527 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:52.535395 kubelet[2211]: E0813 00:04:52.535328 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:53.453685 kubelet[2211]: E0813 00:04:53.453640 2211 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:53.535619 kubelet[2211]: E0813 00:04:53.535577 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:54.537196 kubelet[2211]: E0813 00:04:54.537114 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:54.576369 systemd[1]: Created slice kubepods-besteffort-pod524521ca_2aeb_4618_9df9_4303eccca4cb.slice. Aug 13 00:04:54.741692 kubelet[2211]: I0813 00:04:54.741630 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-1ebf74d1-1dd9-4ceb-a685-5bf74f65db4e\" (UniqueName: \"kubernetes.io/nfs/524521ca-2aeb-4618-9df9-4303eccca4cb-pvc-1ebf74d1-1dd9-4ceb-a685-5bf74f65db4e\") pod \"test-pod-1\" (UID: \"524521ca-2aeb-4618-9df9-4303eccca4cb\") " pod="default/test-pod-1" Aug 13 00:04:54.742025 kubelet[2211]: I0813 00:04:54.741973 2211 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8p7pd\" (UniqueName: \"kubernetes.io/projected/524521ca-2aeb-4618-9df9-4303eccca4cb-kube-api-access-8p7pd\") pod \"test-pod-1\" (UID: \"524521ca-2aeb-4618-9df9-4303eccca4cb\") " pod="default/test-pod-1" Aug 13 00:04:54.869000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.884164 kernel: kauditd_printk_skb: 68 callbacks suppressed Aug 13 00:04:54.884304 kernel: audit: type=1400 audit(1755043494.869:792): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.884374 kernel: Failed to create system directory netfs Aug 13 00:04:54.895691 kernel: Failed to create system directory netfs Aug 13 00:04:54.895767 kernel: audit: type=1400 audit(1755043494.869:792): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.895817 kernel: Failed to create system directory netfs Aug 13 00:04:54.869000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.869000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.906170 kernel: audit: type=1400 audit(1755043494.869:792): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.906258 kernel: Failed to create system directory netfs Aug 13 00:04:54.869000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.908746 kernel: audit: type=1400 audit(1755043494.869:792): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.869000 audit[3844]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed1e25e0 a1=12c14 a2=aaaad64de028 a3=aaaaed1d3010 items=0 ppid=579 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:54.935615 kernel: audit: type=1300 audit(1755043494.869:792): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed1e25e0 a1=12c14 a2=aaaad64de028 a3=aaaaed1d3010 items=0 ppid=579 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:54.935725 kernel: Failed to create system directory fscache Aug 13 00:04:54.935774 kernel: audit: type=1327 audit(1755043494.869:792): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:04:54.869000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:04:54.941571 kernel: Failed to create system directory fscache Aug 13 00:04:54.941655 kernel: audit: type=1400 audit(1755043494.912:793): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.950150 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.960715 kernel: audit: type=1400 audit(1755043494.912:793): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.960817 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.971191 kernel: audit: type=1400 audit(1755043494.912:793): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.971266 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.981667 kernel: audit: type=1400 audit(1755043494.912:793): avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.981722 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.985576 kernel: Failed to create system directory fscache Aug 13 00:04:54.985653 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.989496 kernel: Failed to create system directory fscache Aug 13 00:04:54.989575 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.993432 kernel: Failed to create system directory fscache Aug 13 00:04:54.993496 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:54.997354 kernel: Failed to create system directory fscache Aug 13 00:04:54.997417 kernel: Failed to create system directory fscache Aug 13 00:04:54.912000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.000909 kernel: FS-Cache: Loaded Aug 13 00:04:54.912000 audit[3844]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed3f5210 a1=4c344 a2=aaaad64de028 a3=aaaaed1d3010 items=0 ppid=579 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:54.912000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.042762 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.042857 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.042920 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.046806 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.046883 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.050760 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.050825 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.052822 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.056660 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.056764 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.060535 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.060599 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.064360 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.064410 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.068161 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.068334 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.074047 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.074116 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.074188 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.077937 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.078001 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.081873 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.081939 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.085657 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.085719 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.089494 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.089557 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.093298 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.093361 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.097099 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.097184 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.100990 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.101052 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.104866 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.104929 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.108717 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.108792 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.112598 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.112662 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.116414 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.116497 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.120235 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.120308 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.124031 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.124096 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.127928 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.127994 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.131750 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.131859 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.135683 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.135741 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.140967 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.141058 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.141352 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.145105 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.145191 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.149031 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.149083 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.152902 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.152986 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.156900 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.156972 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.160766 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.160837 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.164589 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.164639 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.168416 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.168541 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.172207 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.172301 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.175993 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.176077 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.179917 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.179981 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.183840 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.183892 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.187696 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.187762 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.191543 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.191598 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.195349 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.195424 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.199185 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.199236 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.203053 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.203150 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.207023 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.207104 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.210909 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.210972 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.214780 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.214842 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.220960 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.221074 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.221176 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.224412 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.224466 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.228245 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.228328 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.230259 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.232211 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.236151 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.236213 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.240078 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.240172 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.244024 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.244105 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.247920 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.247970 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.251996 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.252088 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.255720 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.255840 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.257671 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.261683 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.261845 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.265560 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.265643 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.269419 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.269471 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.273276 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.273361 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.277085 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.277172 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.280997 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.281103 kernel: Failed to create system directory sunrpc Aug 13 00:04:55.028000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.295337 kernel: RPC: Registered named UNIX socket transport module. Aug 13 00:04:55.295461 kernel: RPC: Registered udp transport module. Aug 13 00:04:55.295541 kernel: RPC: Registered tcp transport module. Aug 13 00:04:55.299633 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Aug 13 00:04:55.028000 audit[3844]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed441560 a1=14a74c a2=aaaad64de028 a3=aaaaed1d3010 items=6 ppid=579 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:55.028000 audit: CWD cwd="/" Aug 13 00:04:55.028000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:04:55.028000 audit: PATH item=1 name=(null) inode=20189 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:04:55.028000 audit: PATH item=2 name=(null) inode=20189 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:04:55.028000 audit: PATH item=3 name=(null) inode=20190 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:04:55.028000 audit: PATH item=4 name=(null) inode=20189 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:04:55.028000 audit: PATH item=5 name=(null) inode=20191 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:04:55.028000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.350386 kernel: Failed to create system directory nfs Aug 13 00:04:55.350503 kernel: Failed to create system directory nfs Aug 13 00:04:55.350549 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.353952 kernel: Failed to create system directory nfs Aug 13 00:04:55.354013 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.357563 kernel: Failed to create system directory nfs Aug 13 00:04:55.357677 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.359288 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.361113 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.362898 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.364794 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.366541 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.368389 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.370095 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.371993 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.373828 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.375675 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.377458 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.379245 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.380968 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.382827 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.384635 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.386456 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.388223 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.389983 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.391808 kernel: Failed to create system directory nfs Aug 13 00:04:55.399032 kernel: Failed to create system directory nfs Aug 13 00:04:55.399179 kernel: Failed to create system directory nfs Aug 13 00:04:55.399226 kernel: Failed to create system directory nfs Aug 13 00:04:55.399274 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.400833 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.402571 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.404439 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.406232 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.409827 kernel: Failed to create system directory nfs Aug 13 00:04:55.409927 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.411639 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.415258 kernel: Failed to create system directory nfs Aug 13 00:04:55.415429 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.418888 kernel: Failed to create system directory nfs Aug 13 00:04:55.419010 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.422475 kernel: Failed to create system directory nfs Aug 13 00:04:55.422580 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.424188 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.425994 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.429670 kernel: Failed to create system directory nfs Aug 13 00:04:55.429767 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.433252 kernel: Failed to create system directory nfs Aug 13 00:04:55.433303 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.436854 kernel: Failed to create system directory nfs Aug 13 00:04:55.436964 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.438680 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.440424 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.442269 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.443962 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.445862 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.449516 kernel: Failed to create system directory nfs Aug 13 00:04:55.449568 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.451246 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.453185 kernel: Failed to create system directory nfs Aug 13 00:04:55.338000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.487270 kernel: FS-Cache: Netfs 'nfs' registered for caching Aug 13 00:04:55.338000 audit[3844]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed5eaa40 a1=116404 a2=aaaad64de028 a3=aaaaed1d3010 items=0 ppid=579 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:55.338000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.537570 kubelet[2211]: E0813 00:04:55.537494 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.540949 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.541075 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.541152 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.544639 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.544692 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.546401 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.548257 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.549990 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.551936 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.555639 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.555751 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.559255 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.559311 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.562910 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.562963 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.564775 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.566627 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.568466 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.570304 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.572072 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.573991 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.575870 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.577742 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.579611 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.581451 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.585072 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.585152 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.588833 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.588933 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.590658 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.592548 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.594365 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.596236 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.599909 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.599962 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.603643 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.603702 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.607313 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.607362 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.609151 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.611052 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.614847 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.614898 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.618570 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.618713 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.622254 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.622308 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.625914 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.625978 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.627801 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.629639 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.631517 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.633342 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.635188 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.637061 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.638961 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.640830 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.642698 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.644542 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.646439 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.650032 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.650089 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.657499 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.657621 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.657665 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.657705 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.659339 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.663052 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.663171 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.666794 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.666897 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.670508 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.670563 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.672356 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.676030 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.676344 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.678097 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.681875 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.681979 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.683675 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.685578 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.687427 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.689239 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.691063 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.692921 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.694808 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.696672 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.698521 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.700348 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.702190 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.704068 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.705964 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.707901 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.709751 kernel: Failed to create system directory nfs4 Aug 13 00:04:55.523000 audit[3849]: AVC avc: denied { confidentiality } for pid=3849 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.919196 kernel: NFS: Registering the id_resolver key type Aug 13 00:04:55.919324 kernel: Key type id_resolver registered Aug 13 00:04:55.919369 kernel: Key type id_legacy registered Aug 13 00:04:55.523000 audit[3849]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffbd66a010 a1=19c7f4 a2=aaaacfd0e028 a3=aaaaefb82010 items=0 ppid=579 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:55.523000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.940557 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.940632 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.942760 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.944849 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.946958 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.951137 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.951192 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.953273 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.955349 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.957418 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.959533 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.961610 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.963706 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.965832 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.967951 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.970112 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.972204 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.974286 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.976364 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.978441 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.980559 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.982634 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.984734 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.986850 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.988957 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.991080 kernel: Failed to create system directory rpcgss Aug 13 00:04:55.932000 audit[3851]: AVC avc: denied { confidentiality } for pid=3851 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:04:55.932000 audit[3851]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff89a02010 a1=5ee94 a2=aaaac5b6e028 a3=aaaaf7972010 items=0 ppid=579 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:55.932000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Aug 13 00:04:56.020223 nfsidmap[3859]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Aug 13 00:04:56.025543 nfsidmap[3860]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Aug 13 00:04:56.042000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:04:56.042000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:04:56.042000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:04:56.043000 audit[2019]: AVC avc: denied { watch_reads } for pid=2019 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:04:56.043000 audit[2019]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaea248f60 a2=10 a3=0 items=0 ppid=1 pid=2019 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.043000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:04:56.043000 audit[2019]: AVC avc: denied { watch_reads } for pid=2019 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:04:56.043000 audit[2019]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaea248f60 a2=10 a3=0 items=0 ppid=1 pid=2019 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.043000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:04:56.043000 audit[2019]: AVC avc: denied { watch_reads } for pid=2019 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:04:56.043000 audit[2019]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaea248f60 a2=10 a3=0 items=0 ppid=1 pid=2019 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.043000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:04:56.082966 env[1812]: time="2025-08-13T00:04:56.082909826Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:524521ca-2aeb-4618-9df9-4303eccca4cb,Namespace:default,Attempt:0,}" Aug 13 00:04:56.438006 (udev-worker)[3845]: Network interface NamePolicy= disabled on kernel command line. Aug 13 00:04:56.441409 systemd-networkd[1534]: cali5ec59c6bf6e: Link UP Aug 13 00:04:56.447240 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:04:56.447397 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Aug 13 00:04:56.447651 systemd-networkd[1534]: cali5ec59c6bf6e: Gained carrier Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.225 [INFO][3861] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.18.161-k8s-test--pod--1-eth0 default 524521ca-2aeb-4618-9df9-4303eccca4cb 1461 0 2025-08-13 00:04:22 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.18.161 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.225 [INFO][3861] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-eth0" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.273 [INFO][3874] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" HandleID="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Workload="172.31.18.161-k8s-test--pod--1-eth0" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.274 [INFO][3874] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" HandleID="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Workload="172.31.18.161-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"172.31.18.161", "pod":"test-pod-1", "timestamp":"2025-08-13 00:04:56.273844852 +0000 UTC"}, Hostname:"172.31.18.161", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.274 [INFO][3874] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.274 [INFO][3874] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.274 [INFO][3874] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.18.161' Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.326 [INFO][3874] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.343 [INFO][3874] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.366 [INFO][3874] ipam/ipam.go 511: Trying affinity for 192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.373 [INFO][3874] ipam/ipam.go 158: Attempting to load block cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.383 [INFO][3874] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.383 [INFO][3874] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.386 [INFO][3874] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026 Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.394 [INFO][3874] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.430 [INFO][3874] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.37.4/26] block=192.168.37.0/26 handle="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.431 [INFO][3874] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.37.4/26] handle="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" host="172.31.18.161" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.431 [INFO][3874] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.431 [INFO][3874] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.4/26] IPv6=[] ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" HandleID="k8s-pod-network.0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Workload="172.31.18.161-k8s-test--pod--1-eth0" Aug 13 00:04:56.470099 env[1812]: 2025-08-13 00:04:56.434 [INFO][3861] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"524521ca-2aeb-4618-9df9-4303eccca4cb", ResourceVersion:"1461", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 4, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:56.471548 env[1812]: 2025-08-13 00:04:56.434 [INFO][3861] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.37.4/32] ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-eth0" Aug 13 00:04:56.471548 env[1812]: 2025-08-13 00:04:56.434 [INFO][3861] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-eth0" Aug 13 00:04:56.471548 env[1812]: 2025-08-13 00:04:56.447 [INFO][3861] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-eth0" Aug 13 00:04:56.471548 env[1812]: 2025-08-13 00:04:56.448 [INFO][3861] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.18.161-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"524521ca-2aeb-4618-9df9-4303eccca4cb", ResourceVersion:"1461", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 4, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.18.161", ContainerID:"0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"42:30:87:26:ed:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:04:56.471548 env[1812]: 2025-08-13 00:04:56.461 [INFO][3861] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.18.161-k8s-test--pod--1-eth0" Aug 13 00:04:56.493000 audit[3888]: NETFILTER_CFG table=filter:86 family=2 entries=40 op=nft_register_chain pid=3888 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:04:56.493000 audit[3888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffd56b80f0 a2=0 a3=ffffbe477fa8 items=0 ppid=2841 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.493000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:04:56.504545 env[1812]: time="2025-08-13T00:04:56.504432132Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:04:56.504790 env[1812]: time="2025-08-13T00:04:56.504742594Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:04:56.504978 env[1812]: time="2025-08-13T00:04:56.504932890Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:04:56.505788 env[1812]: time="2025-08-13T00:04:56.505656269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026 pid=3897 runtime=io.containerd.runc.v2 Aug 13 00:04:56.536520 systemd[1]: Started cri-containerd-0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026.scope. Aug 13 00:04:56.540895 kubelet[2211]: E0813 00:04:56.539683 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.575000 audit: BPF prog-id=132 op=LOAD Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3897 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633938643065313237336234353739323834343764303338653937 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3897 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633938643065313237336234353739323834343764303338653937 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit: BPF prog-id=133 op=LOAD Aug 13 00:04:56.578000 audit[3907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3897 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633938643065313237336234353739323834343764303338653937 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.578000 audit: BPF prog-id=134 op=LOAD Aug 13 00:04:56.578000 audit[3907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3897 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633938643065313237336234353739323834343764303338653937 Aug 13 00:04:56.578000 audit: BPF prog-id=134 op=UNLOAD Aug 13 00:04:56.578000 audit: BPF prog-id=133 op=UNLOAD Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:56.579000 audit: BPF prog-id=135 op=LOAD Aug 13 00:04:56.579000 audit[3907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3897 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:56.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633938643065313237336234353739323834343764303338653937 Aug 13 00:04:56.621071 env[1812]: time="2025-08-13T00:04:56.620998707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:524521ca-2aeb-4618-9df9-4303eccca4cb,Namespace:default,Attempt:0,} returns sandbox id \"0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026\"" Aug 13 00:04:56.624653 env[1812]: time="2025-08-13T00:04:56.624583852Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Aug 13 00:04:56.925585 env[1812]: time="2025-08-13T00:04:56.925531503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:56.932044 env[1812]: time="2025-08-13T00:04:56.931994408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:07abd578947db789c018f907bed24fcc55d80455e9614b35a065bf3af4f3ac27,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:56.936814 env[1812]: time="2025-08-13T00:04:56.936762271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:56.940732 env[1812]: time="2025-08-13T00:04:56.940662569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:a6969d434cb816d30787e9f7ab16b632e12dc05a2c8f4dae701d83ef2199c985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:04:56.942441 env[1812]: time="2025-08-13T00:04:56.942393631Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:07abd578947db789c018f907bed24fcc55d80455e9614b35a065bf3af4f3ac27\"" Aug 13 00:04:56.947588 env[1812]: time="2025-08-13T00:04:56.947507099Z" level=info msg="CreateContainer within sandbox \"0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026\" for container &ContainerMetadata{Name:test,Attempt:0,}" Aug 13 00:04:56.973985 env[1812]: time="2025-08-13T00:04:56.973886894Z" level=info msg="CreateContainer within sandbox \"0cc98d0e1273b457928447d038e9738dab04b9d5bd20cd6503709b52a2f19026\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"cb687d50b1af889dad9b24694b7c61c41a153cfe8f2c9cd08f769fba06cce773\"" Aug 13 00:04:56.975107 env[1812]: time="2025-08-13T00:04:56.975029453Z" level=info msg="StartContainer for \"cb687d50b1af889dad9b24694b7c61c41a153cfe8f2c9cd08f769fba06cce773\"" Aug 13 00:04:57.005329 systemd[1]: Started cri-containerd-cb687d50b1af889dad9b24694b7c61c41a153cfe8f2c9cd08f769fba06cce773.scope. Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.058000 audit: BPF prog-id=136 op=LOAD Aug 13 00:04:57.060000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.060000 audit[3938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3897 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363837643530623161663838396461643962323436393462376336 Aug 13 00:04:57.060000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.060000 audit[3938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3897 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363837643530623161663838396461643962323436393462376336 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit: BPF prog-id=137 op=LOAD Aug 13 00:04:57.061000 audit[3938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3897 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:57.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363837643530623161663838396461643962323436393462376336 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.061000 audit: BPF prog-id=138 op=LOAD Aug 13 00:04:57.061000 audit[3938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3897 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:57.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363837643530623161663838396461643962323436393462376336 Aug 13 00:04:57.061000 audit: BPF prog-id=138 op=UNLOAD Aug 13 00:04:57.062000 audit: BPF prog-id=137 op=UNLOAD Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:04:57.062000 audit: BPF prog-id=139 op=LOAD Aug 13 00:04:57.062000 audit[3938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3897 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:04:57.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363837643530623161663838396461643962323436393462376336 Aug 13 00:04:57.094611 env[1812]: time="2025-08-13T00:04:57.094545702Z" level=info msg="StartContainer for \"cb687d50b1af889dad9b24694b7c61c41a153cfe8f2c9cd08f769fba06cce773\" returns successfully" Aug 13 00:04:57.540683 kubelet[2211]: E0813 00:04:57.540616 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:58.081407 kubelet[2211]: I0813 00:04:58.081333 2211 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.759861781 podStartE2EDuration="36.081309367s" podCreationTimestamp="2025-08-13 00:04:22 +0000 UTC" firstStartedPulling="2025-08-13 00:04:56.623699549 +0000 UTC m=+84.802681229" lastFinishedPulling="2025-08-13 00:04:56.945147135 +0000 UTC m=+85.124128815" observedRunningTime="2025-08-13 00:04:58.080932189 +0000 UTC m=+86.259913893" watchObservedRunningTime="2025-08-13 00:04:58.081309367 +0000 UTC m=+86.260291035" Aug 13 00:04:58.395919 systemd-networkd[1534]: cali5ec59c6bf6e: Gained IPv6LL Aug 13 00:04:58.541020 kubelet[2211]: E0813 00:04:58.540961 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:04:59.541391 kubelet[2211]: E0813 00:04:59.541317 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:05:00.541820 kubelet[2211]: E0813 00:05:00.541766 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:05:01.543135 kubelet[2211]: E0813 00:05:01.543066 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:05:02.543663 kubelet[2211]: E0813 00:05:02.543591 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:05:03.544199 kubelet[2211]: E0813 00:05:03.544150 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:05:04.544827 kubelet[2211]: E0813 00:05:04.544756 2211 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"